Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:3.11.0:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2015-7836 |
Siemens RUGGEDCOM ROS before 4.2.1 allows remote attackers to obtain sensitive information by sniffing the network for VLAN data within the padding section of an Ethernet frame. Published: October 28, 2015; 6:59:17 AM -0400 |
V3.x:(not available) V2.0: 3.3 LOW |
CVE-2015-5537 |
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566. Published: August 02, 2015; 9:59:02 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2013-6926 |
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote authenticated users to bypass intended restrictions on administrative actions by leveraging access to a (1) guest or (2) operator account. Published: December 16, 2013; 11:46:45 PM -0500 |
V3.x:(not available) V2.0: 8.0 HIGH |
CVE-2013-6925 |
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote attackers to hijack web sessions by predicting a session id value. Published: December 16, 2013; 11:46:45 PM -0500 |
V3.x:(not available) V2.0: 8.3 HIGH |