Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown

CVE-2015-7836

Disclosure Date: October 28, 2015 (last updated October 05, 2023)
Siemens RUGGEDCOM ROS before 4.2.1 allows remote attackers to obtain sensitive information by sniffing the network for VLAN data within the padding section of an Ethernet frame.
0
Attacker Value
Unknown

CVE-2015-6675

Disclosure Date: September 11, 2015 (last updated October 05, 2023)
Siemens RUGGEDCOM ROS 3.8.0 through 4.1.x permanently enables the IP forwarding feature, which allows remote attackers to bypass a VLAN isolation protection mechanism via IP traffic.
0
Attacker Value
Unknown

CVE-2015-5537

Disclosure Date: August 03, 2015 (last updated October 05, 2023)
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566.
0
Attacker Value
Unknown

CVE-2014-2590

Disclosure Date: April 01, 2014 (last updated October 05, 2023)
The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G, ROS 3.12, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (interface outage) via crafted HTTP packets.
0
Attacker Value
Unknown

CVE-2014-1966

Disclosure Date: February 24, 2014 (last updated October 05, 2023)
The SNMP implementation in Siemens RuggedCom ROS before 3.11, ROS 3.11 for RS950G, ROS 3.12 before 3.12.4, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (device outage) via crafted packets.
0
Attacker Value
Unknown

CVE-2013-6926

Disclosure Date: December 17, 2013 (last updated October 05, 2023)
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote authenticated users to bypass intended restrictions on administrative actions by leveraging access to a (1) guest or (2) operator account.
0
Attacker Value
Unknown

CVE-2013-6925

Disclosure Date: December 17, 2013 (last updated October 05, 2023)
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote attackers to hijack web sessions by predicting a session id value.
0
Attacker Value
Unknown

CVE-2012-1803

Disclosure Date: April 28, 2012 (last updated October 04, 2023)
RuggedCom Rugged Operating System (ROS) 3.10.x and earlier has a factory account with a password derived from the MAC Address field in the banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) TELNET, (2) remote shell (aka rsh), or (3) serial-console session.
0
Attacker Value
Unknown

CVE-2012-2441

Disclosure Date: April 28, 2012 (last updated October 04, 2023)
RuggedCom Rugged Operating System (ROS) before 3.3 has a factory account with a password derived from the MAC Address field in a banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) SSH or (2) HTTPS session, a different vulnerability than CVE-2012-1803.
0