Siemens

Ruggedcom Rugged Operating System

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.27%
  • Published 28.10.2015 10:59:17
  • Last modified 12.04.2025 10:46:40

Siemens RUGGEDCOM ROS before 4.2.1 allows remote attackers to obtain sensitive information by sniffing the network for VLAN data within the padding section of an Ethernet frame.

  • EPSS 0.14%
  • Published 11.09.2015 16:59:11
  • Last modified 12.04.2025 10:46:40

Siemens RUGGEDCOM ROS 3.8.0 through 4.1.x permanently enables the IP forwarding feature, which allows remote attackers to bypass a VLAN isolation protection mechanism via IP traffic.

  • EPSS 0.32%
  • Published 03.08.2015 01:59:02
  • Last modified 12.04.2025 10:46:40

The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulne...

  • EPSS 0.31%
  • Published 01.04.2014 06:29:39
  • Last modified 12.04.2025 10:46:40

The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G, ROS 3.12, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (interface outage) via crafted HTTP packets.

  • EPSS 0.25%
  • Published 24.02.2014 04:48:10
  • Last modified 11.04.2025 00:51:21

The SNMP implementation in Siemens RuggedCom ROS before 3.11, ROS 3.11 for RS950G, ROS 3.12 before 3.12.4, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (device outage) via crafted packets.

  • EPSS 0.56%
  • Published 17.12.2013 04:46:45
  • Last modified 11.04.2025 00:51:21

The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote attackers to hijack web sessions by predicting a session id value.

  • EPSS 0.27%
  • Published 17.12.2013 04:46:45
  • Last modified 11.04.2025 00:51:21

The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote authenticated users to bypass intended restrictions on administrative actions by leveraging access to a (1) guest or (2) operator account.

Exploit
  • EPSS 61.25%
  • Published 28.04.2012 00:55:01
  • Last modified 11.04.2025 00:51:21

RuggedCom Rugged Operating System (ROS) 3.10.x and earlier has a factory account with a password derived from the MAC Address field in the banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address...

Exploit
  • EPSS 22.69%
  • Published 28.04.2012 00:55:01
  • Last modified 11.04.2025 00:51:21

RuggedCom Rugged Operating System (ROS) before 3.3 has a factory account with a password derived from the MAC Address field in a banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, an...