Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:3.10.1:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2015-7836 |
Siemens RUGGEDCOM ROS before 4.2.1 allows remote attackers to obtain sensitive information by sniffing the network for VLAN data within the padding section of an Ethernet frame. Published: October 28, 2015; 6:59:17 AM -0400 |
V3.x:(not available) V2.0: 3.3 LOW |
CVE-2015-5537 |
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566. Published: August 02, 2015; 9:59:02 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2014-2590 |
The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G, ROS 3.12, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (interface outage) via crafted HTTP packets. Published: April 01, 2014; 2:29:39 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2014-1966 |
The SNMP implementation in Siemens RuggedCom ROS before 3.11, ROS 3.11 for RS950G, ROS 3.12 before 3.12.4, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (device outage) via crafted packets. Published: February 23, 2014; 11:48:10 PM -0500 |
V3.x:(not available) V2.0: 7.8 HIGH |
CVE-2013-6926 |
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote authenticated users to bypass intended restrictions on administrative actions by leveraging access to a (1) guest or (2) operator account. Published: December 16, 2013; 11:46:45 PM -0500 |
V3.x:(not available) V2.0: 8.0 HIGH |
CVE-2013-6925 |
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote attackers to hijack web sessions by predicting a session id value. Published: December 16, 2013; 11:46:45 PM -0500 |
V3.x:(not available) V2.0: 8.3 HIGH |
CVE-2012-1803 |
RuggedCom Rugged Operating System (ROS) 3.10.x and earlier has a factory account with a password derived from the MAC Address field in the banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) TELNET, (2) remote shell (aka rsh), or (3) serial-console session. Published: April 27, 2012; 8:55:01 PM -0400 |
V3.x:(not available) V2.0: 8.5 HIGH |