var-201204-0128
Vulnerability from variot

RuggedCom Rugged Operating System (ROS) 3.10.x and earlier has a factory account with a password derived from the MAC Address field in the banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) TELNET, (2) remote shell (aka rsh), or (3) serial-console session. Rugged Operating System (ROS) Has problems due to hard-coded user accounts. RuggedCom Provided by RuggedSwitch Used for series Rugged Operating System (ROS) Has user accounts that cannot be deleted. This account has a fixed username and a password that can be guessed.A remote attacker may be logged in as an administrator. RuggedCom Inc is the world's leading manufacturer of high-performance networking and communication equipment for industrial environments. This account password is based on the device's MAC address and can be easily obtained through reverse engineering. ROS also supports HTTP(S) and SSH services. It is currently incorrect whether these services use the factory, and it is also unclear whether successful or unsuccessful login attempts will be recorded. Rugged Operating System is prone to an unauthorized-access vulnerability due to a backdoor in all versions of the application. Attackers can exploit this issue to gain unauthorized access to the affected application. This may aid in further attacks. ----------------------------------------------------------------------

Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch


TITLE: RuggedCom Rugged Operating System Undocumented Account Security Issue

SECUNIA ADVISORY ID: SA48963

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48963/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48963

RELEASE DATE: 2012-04-25

DISCUSS ADVISORY: http://secunia.com/advisories/48963/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/48963/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=48963

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: JC CREW has reported a security issue in RuggedCom Rugged Operating System (ROS), which can be exploited by malicious people to bypass certain security restrictions.

The security issue is caused due to ROS containing an undocumented hardcoded username where the password is generated based on the MAC address and can be exploited to gain administrative access.

SOLUTION: Restrict access to trusted hosts only.

PROVIDED AND/OR DISCOVERED BY: JC CREW

ORIGINAL ADVISORY: JC CREW: http://archives.neohapsis.com/archives/fulldisclosure/2012-04/0276.html

US-CERT: http://www.kb.cert.org/vuls/id/889195

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201204-0128",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ruggedcom rugged operating system",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.2.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.10.1"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "ruggedcom",
        "version": "3.9.1"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ruggedcom",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "rugged operating system",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ruggedcom",
        "version": "3.10.1 earlier"
      },
      {
        "model": "rugged operating system",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ruggedcom",
        "version": "3.7.9 earlier"
      },
      {
        "model": "rugged operating system",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ruggedcom",
        "version": "3.8.5 earlier"
      },
      {
        "model": "rugged operating system",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ruggedcom",
        "version": "3.9.3 earlier"
      },
      {
        "model": "ros",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ruggedcom",
        "version": "3.3"
      },
      {
        "model": "ros",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ruggedcom",
        "version": "3.9"
      },
      {
        "model": "ros",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ruggedcom",
        "version": "3.8"
      },
      {
        "model": "ros",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ruggedcom",
        "version": "3.10"
      },
      {
        "model": "ros",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ruggedcom",
        "version": "3.7"
      },
      {
        "model": "ros",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ruggedcom",
        "version": "3.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ros",
        "version": "3.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ros",
        "version": "3.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ros",
        "version": "3.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ros",
        "version": "3.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ros",
        "version": "3.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ros",
        "version": "*"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ruggedcom",
        "version": "3.3"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ruggedcom",
        "version": "3.2"
      },
      {
        "model": "rugged operating system",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ruggedcom",
        "version": "3.10.1"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a85421c0-1f6a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "eba10514-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#889195"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "db": "BID",
        "id": "53215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002127"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-510"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1803"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:ruggedcom:ros",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002127"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "jc",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2012-1803",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.8,
            "id": "CVE-2012-1803",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "availabilityRequirement": "NOT DEFINED",
            "baseScore": 8.5,
            "collateralDamagePotential": "NOT DEFINED",
            "confidentialityImpact": "COMPLETE",
            "confidentialityRequirement": "NOT DEFINED",
            "enviromentalScore": 1.8,
            "exploitability": "PROOF-OF-CONCEPT",
            "exploitabilityScore": 6.8,
            "id": "CVE-2012-1803",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "integrityRequirement": "NOT DEFINED",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "remediationLevel": "WORKAROUND",
            "reportConfidence": "CONFIRMED",
            "severity": "HIGH",
            "targetDistribution": "LOW",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vector_string": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.8,
            "id": "a85421c0-1f6a-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.8,
            "id": "eba10514-2353-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-1803",
            "trust": 1.6,
            "value": "HIGH"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-1803",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201204-510",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "a85421c0-1f6a-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "eba10514-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a85421c0-1f6a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "eba10514-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#889195"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002127"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-510"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1803"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "RuggedCom Rugged Operating System (ROS) 3.10.x and earlier has a factory account with a password derived from the MAC Address field in the banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) TELNET, (2) remote shell (aka rsh), or (3) serial-console session. Rugged Operating System (ROS) Has problems due to hard-coded user accounts. RuggedCom Provided by RuggedSwitch Used for series Rugged Operating System (ROS) Has user accounts that cannot be deleted. This account has a fixed username and a password that can be guessed.A remote attacker may be logged in as an administrator. RuggedCom Inc is the world\u0027s leading manufacturer of high-performance networking and communication equipment for industrial environments. This account password is based on the device\u0027s MAC address and can be easily obtained through reverse engineering. ROS also supports HTTP(S) and SSH services. It is currently incorrect whether these services use the factory, and it is also unclear whether successful or unsuccessful login attempts will be recorded. Rugged Operating System is prone to an unauthorized-access vulnerability due to a backdoor in all versions of the application. \nAttackers can exploit this issue to gain unauthorized access to the affected application. This may aid in further attacks. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nRuggedCom Rugged Operating System Undocumented Account Security Issue\n\nSECUNIA ADVISORY ID:\nSA48963\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48963/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48963\n\nRELEASE DATE:\n2012-04-25\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48963/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48963/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48963\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nJC CREW has reported a security issue in RuggedCom Rugged Operating\nSystem (ROS), which can be exploited by malicious people to bypass\ncertain security restrictions. \n\nThe security issue is caused due to ROS containing an undocumented\nhardcoded username where the password is generated based on the MAC\naddress and can be exploited to gain administrative access. \n\nSOLUTION:\nRestrict access to trusted hosts only. \n\nPROVIDED AND/OR DISCOVERED BY:\nJC CREW\n\nORIGINAL ADVISORY:\nJC CREW:\nhttp://archives.neohapsis.com/archives/fulldisclosure/2012-04/0276.html\n\nUS-CERT:\nhttp://www.kb.cert.org/vuls/id/889195\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-1803"
      },
      {
        "db": "CERT/CC",
        "id": "VU#889195"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002127"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "db": "BID",
        "id": "53215"
      },
      {
        "db": "IVD",
        "id": "a85421c0-1f6a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "eba10514-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "PACKETSTORM",
        "id": "112186"
      }
    ],
    "trust": 3.6
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.kb.cert.org/vuls/id/889195",
        "trust": 0.8,
        "type": "poc"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#889195"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#889195",
        "trust": 4.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-146-01A",
        "trust": 3.2
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1803",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "53215",
        "trust": 3.1
      },
      {
        "db": "ICS CERT ALERT",
        "id": "ICS-ALERT-12-116-01A",
        "trust": 2.4
      },
      {
        "db": "EXPLOIT-DB",
        "id": "18779",
        "trust": 1.6
      },
      {
        "db": "ICS CERT ALERT",
        "id": "ICS-ALERT-12-116-01",
        "trust": 1.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-146-01",
        "trust": 1.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-510",
        "trust": 1.0
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002127",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "A85421C0-1F6A-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "EBA10514-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "SECUNIA",
        "id": "48963",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "112186",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a85421c0-1f6a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "eba10514-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#889195"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "db": "BID",
        "id": "53215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002127"
      },
      {
        "db": "PACKETSTORM",
        "id": "112186"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-510"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1803"
      }
    ]
  },
  "id": "VAR-201204-0128",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "a85421c0-1f6a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "eba10514-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      }
    ],
    "trust": 1.6487494200000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a85421c0-1f6a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "eba10514-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:49:42.783000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Latest news on ROS Device Security Issue",
        "trust": 0.8,
        "url": "http://www.ruggedcom.com/productbulletin/ros-security-page/"
      },
      {
        "title": "Software Downloads",
        "trust": 0.8,
        "url": "http://www.ruggedcom.com/support/software/index.php"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002127"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002127"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1803"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.2,
        "url": "http://www.ruggedcom.com/productbulletin/ros-security-page/"
      },
      {
        "trust": 2.8,
        "url": "http://www.kb.cert.org/vuls/id/889195"
      },
      {
        "trust": 2.4,
        "url": "http://seclists.org/fulldisclosure/2012/apr/277"
      },
      {
        "trust": 2.4,
        "url": "http://arstechnica.com/business/news/2012/04/backdoor-in-mission-critical-hardware-threatens-power-traffic-control-systems.ars"
      },
      {
        "trust": 2.4,
        "url": "http://www.wired.com/threatlevel/2012/04/ruggedcom-backdoor/"
      },
      {
        "trust": 2.4,
        "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-116-01a.pdf"
      },
      {
        "trust": 2.2,
        "url": "http://www.securityfocus.com/bid/53215"
      },
      {
        "trust": 1.6,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-146-01a.pdf"
      },
      {
        "trust": 1.6,
        "url": "http://www.kb.cert.org/vuls/id/mapg-8rcpen"
      },
      {
        "trust": 1.6,
        "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0186.html"
      },
      {
        "trust": 1.6,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75120"
      },
      {
        "trust": 1.6,
        "url": "http://www.exploit-db.com/exploits/18779"
      },
      {
        "trust": 1.6,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-12-146-01a"
      },
      {
        "trust": 1.1,
        "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-116-01.pdf"
      },
      {
        "trust": 1.1,
        "url": "https://www.us-cert.gov/control_systems/pdf/icsa-12-146-01.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://www.ruggedcom.com/products/index.php"
      },
      {
        "trust": 0.8,
        "url": "http://www.ruggedcom.com/support/software/index.php"
      },
      {
        "trust": 0.8,
        "url": "http://cwe.mitre.org/data/definitions/261.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1803"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu889195"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1803"
      },
      {
        "trust": 0.6,
        "url": "http://www.kb.cert.org/vuls/id/889195http"
      },
      {
        "trust": 0.3,
        "url": "http://www.ruggedcom.com/"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/522467"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48963"
      },
      {
        "trust": 0.1,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-04/0276.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/psi_30_beta_launch"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48963/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48963/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#889195"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "db": "BID",
        "id": "53215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002127"
      },
      {
        "db": "PACKETSTORM",
        "id": "112186"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-510"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1803"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "a85421c0-1f6a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "eba10514-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#889195"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "db": "BID",
        "id": "53215"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002127"
      },
      {
        "db": "PACKETSTORM",
        "id": "112186"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-510"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-1803"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-04-26T00:00:00",
        "db": "IVD",
        "id": "a85421c0-1f6a-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-04-27T00:00:00",
        "db": "IVD",
        "id": "eba10514-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-04-24T00:00:00",
        "db": "CERT/CC",
        "id": "VU#889195"
      },
      {
        "date": "2012-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "date": "2012-04-24T00:00:00",
        "db": "BID",
        "id": "53215"
      },
      {
        "date": "2012-04-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002127"
      },
      {
        "date": "2012-04-25T02:37:37",
        "db": "PACKETSTORM",
        "id": "112186"
      },
      {
        "date": "2012-04-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "date": "2012-04-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201204-510"
      },
      {
        "date": "2012-04-28T00:55:01.203000",
        "db": "NVD",
        "id": "CVE-2012-1803"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-07-18T00:00:00",
        "db": "CERT/CC",
        "id": "VU#889195"
      },
      {
        "date": "2020-03-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "date": "2012-06-18T21:30:00",
        "db": "BID",
        "id": "53215"
      },
      {
        "date": "2012-06-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002127"
      },
      {
        "date": "2012-05-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "date": "2022-02-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201204-510"
      },
      {
        "date": "2024-11-21T01:37:48.810000",
        "db": "NVD",
        "id": "CVE-2012-1803"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-510"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rugged Operating System Backdoor Unauthorized Access Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "a85421c0-1f6a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "db": "BID",
        "id": "53215"
      }
    ],
    "trust": 1.1
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-510"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…