Vulnerabilities > Siemens > Ruggedcom Rugged Operating System

DATE CVE VULNERABILITY TITLE RISK
2015-10-28 CVE-2015-7836 Information Exposure vulnerability in Siemens Ruggedcom Rugged Operating System
Siemens RUGGEDCOM ROS before 4.2.1 allows remote attackers to obtain sensitive information by sniffing the network for VLAN data within the padding section of an Ethernet frame.
low complexity
siemens CWE-200
3.3
2015-09-11 CVE-2015-6675 Improper Access Control vulnerability in Siemens Ruggedcom Rugged Operating System 3.8.0/4.0.0/4.1.0
Siemens RUGGEDCOM ROS 3.8.0 through 4.1.x permanently enables the IP forwarding feature, which allows remote attackers to bypass a VLAN isolation protection mechanism via IP traffic.
4.3
2015-08-03 CVE-2015-5537 Cleartext Storage of Sensitive Information vulnerability in Siemens products
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566.
network
siemens CWE-312
4.3
2014-04-01 CVE-2014-2590 Missing Authentication for Critical Function vulnerability in Siemens Ruggedcom Rugged Operating System
The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G, ROS 3.12, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (interface outage) via crafted HTTP packets.
network
low complexity
siemens CWE-306
5.0
2014-02-24 CVE-2014-1966 Unspecified vulnerability in Siemens Ruggedcom Rugged Operating System
The SNMP implementation in Siemens RuggedCom ROS before 3.11, ROS 3.11 for RS950G, ROS 3.12 before 3.12.4, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (device outage) via crafted packets.
network
low complexity
siemens
7.8
2013-12-17 CVE-2013-6926 Incorrect Authorization vulnerability in Siemens Ruggedcom Rugged Operating System
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote authenticated users to bypass intended restrictions on administrative actions by leveraging access to a (1) guest or (2) operator account.
network
low complexity
siemens CWE-863
8.0
2013-12-17 CVE-2013-6925 Use of Insufficiently Random Values vulnerability in Siemens Ruggedcom Rugged Operating System
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote attackers to hijack web sessions by predicting a session id value.
network
siemens CWE-330
8.3
2012-04-28 CVE-2012-2441 Weak Password Requirements vulnerability in Siemens Ruggedcom Rugged Operating System 3.2.5
RuggedCom Rugged Operating System (ROS) before 3.3 has a factory account with a password derived from the MAC Address field in a banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) SSH or (2) HTTPS session, a different vulnerability than CVE-2012-1803.
network
siemens CWE-521
8.5
2012-04-28 CVE-2012-1803 Cryptographic Issues vulnerability in Siemens Ruggedcom Rugged Operating System
RuggedCom Rugged Operating System (ROS) 3.10.x and earlier has a factory account with a password derived from the MAC Address field in the banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) TELNET, (2) remote shell (aka rsh), or (3) serial-console session.
network
siemens CWE-310
8.5