var-201212-0036
Vulnerability from variot

Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS through 2.3.0, and RuggedMax OS through 4.2.1.4621.22 use hardcoded private keys for SSL and SSH communication, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic by leveraging the availability of these keys within ROS files at all customer installations. plural Siemens Since the product uses a hard-coded private key, there are vulnerabilities that allow the server to be impersonated and network traffic to be decrypted.Man-in-the-middle attacks (man-in-the-middle attack) Is installed in the user's environment ROS By using the private key in the file, the server can be spoofed and network traffic can be decrypted. According to the report, SSL keys can be extracted from ROS binary files using publicly available software. RuggedCom Inc is the world's leading manufacturer of high-performance network and communications equipment for industrial environments. The Rugged operating system has a hard-coded RSA private key for SSL / TLS communication. The POC code for this vulnerability has been released by Justin W. Clarke of Cylance Inc. According to a report, this vulnerability can be used for SSL between end users and RuggedCom network devices The communication is decrypted. Rugged Operating System is prone to an information-disclosure vulnerability. There is a vulnerability in Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS before 1.14.5, ROX II OS before 2.3.0, and RuggedMax OS before 4.2.1.4621.22

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201212-0036",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ruggedmax os",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "siemens",
        "version": "4.2.1.4621.22"
      },
      {
        "model": "ros",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.11.0"
      },
      {
        "model": "rox i os",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "1.14.5"
      },
      {
        "model": "rox ii os",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.3.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.11"
      },
      {
        "model": "ruggedcom rugged operating system on linux i",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "1.14.5"
      },
      {
        "model": "ruggedcom rugged operating system on linux ii",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "2.3.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.12"
      },
      {
        "model": "rox i os",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "1.14.5"
      },
      {
        "model": "rox ii os",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "2.3.0"
      },
      {
        "model": "ruggedmax os",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "4.2.1.4621.22"
      },
      {
        "model": "rugged operating system",
        "scope": null,
        "trust": 0.6,
        "vendor": "ruggedcom",
        "version": null
      },
      {
        "model": "ruggedmax os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "4.2.1.4621.22"
      },
      {
        "model": "rox ii os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "2.3.0"
      },
      {
        "model": "rox i os",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "1.14.5"
      },
      {
        "model": "ros",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.11.0"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ruggedcom",
        "version": "3.10.1"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-9303"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-4389"
      },
      {
        "db": "BID",
        "id": "55123"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005789"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-325"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4698"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:siemens:ruggedcom_rugged_operating_system",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:rox_i_os",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:rox_ii_os",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:ruggedmax_os",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005789"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Justin W. Clarke",
    "sources": [
      {
        "db": "BID",
        "id": "55123"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-385"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-4698",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2012-4698",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-57979",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-4698",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-4698",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201212-325",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-57979",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-57979"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005789"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-325"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4698"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS through 2.3.0, and RuggedMax OS through 4.2.1.4621.22 use hardcoded private keys for SSL and SSH communication, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic by leveraging the availability of these keys within ROS files at all customer installations. plural Siemens Since the product uses a hard-coded private key, there are vulnerabilities that allow the server to be impersonated and network traffic to be decrypted.Man-in-the-middle attacks (man-in-the-middle attack) Is installed in the user\u0027s environment ROS By using the private key in the file, the server can be spoofed and network traffic can be decrypted. According to the report, SSL keys can be extracted from ROS binary files using publicly available software. RuggedCom Inc is the world\u0027s leading manufacturer of high-performance network and communications equipment for industrial environments. The Rugged operating system has a hard-coded RSA private key for SSL / TLS communication. The POC code for this vulnerability has been released by Justin W. Clarke of Cylance Inc. According to a report, this vulnerability can be used for SSL between end users and RuggedCom network devices The communication is decrypted. Rugged Operating System is prone to an information-disclosure vulnerability. There is a vulnerability in Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS before 1.14.5, ROX II OS before 2.3.0, and RuggedMax OS before 4.2.1.4621.22",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4698"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005789"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-9303"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-4389"
      },
      {
        "db": "BID",
        "id": "55123"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57979"
      }
    ],
    "trust": 3.06
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-4698",
        "trust": 3.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-354-01",
        "trust": 3.1
      },
      {
        "db": "SIEMENS",
        "id": "SSA-622607",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "55123",
        "trust": 1.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-354-01A",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005789",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-325",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-9303",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-4389",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-385",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-57979",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-9303"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-4389"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57979"
      },
      {
        "db": "BID",
        "id": "55123"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005789"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-385"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-325"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4698"
      }
    ]
  },
  "id": "VAR-201212-0036",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-9303"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-4389"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57979"
      }
    ],
    "trust": 1.9438191599999999
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.2
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-9303"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-4389"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:35:25.705000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "RuggedCom Security Updates",
        "trust": 0.8,
        "url": "http://www.ruggedcom.com/productbulletin/ros-security-page/"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.siemens.com/entry/cc/en/"
      },
      {
        "title": "SSA-622607: RuggedCom Private Key Vulnerabilities for HTTPS/SSL and SSH",
        "trust": 0.8,
        "url": "https://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-622607.pdf"
      },
      {
        "title": "\u30b7\u30fc\u30e1\u30f3\u30b9\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://www.automation.siemens.com/automation/jp/ja/solutionpartner/pages/default.aspx"
      },
      {
        "title": "\u30b7\u30fc\u30e1\u30f3\u30b9\u30fb\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e",
        "trust": 0.8,
        "url": "http://www.siemens.com/answers/jp/ja/"
      },
      {
        "title": "Patch for Rugged Operating System Hardcoded Private Key Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/26800"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-9303"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005789"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-57979"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005789"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4698"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-354-01.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://www.ruggedcom.com/productbulletin/ros-security-page/"
      },
      {
        "trust": 1.7,
        "url": "https://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-622607.pdf"
      },
      {
        "trust": 1.1,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-12-354-01a"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4698"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4698"
      },
      {
        "trust": 0.6,
        "url": "http://isc.sans.edu/diary.html?storyid=13948http"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/55123"
      },
      {
        "trust": 0.3,
        "url": "http://www.ruggedcom.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-9303"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-4389"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57979"
      },
      {
        "db": "BID",
        "id": "55123"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005789"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-385"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-325"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4698"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-9303"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-4389"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57979"
      },
      {
        "db": "BID",
        "id": "55123"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005789"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-385"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-325"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4698"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-12-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-9303"
      },
      {
        "date": "2012-08-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-4389"
      },
      {
        "date": "2012-12-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-57979"
      },
      {
        "date": "2012-08-21T00:00:00",
        "db": "BID",
        "id": "55123"
      },
      {
        "date": "2012-12-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-005789"
      },
      {
        "date": "2012-08-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201208-385"
      },
      {
        "date": "2012-12-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201212-325"
      },
      {
        "date": "2012-12-23T21:55:01.437000",
        "db": "NVD",
        "id": "CVE-2012-4698"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-12-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-9303"
      },
      {
        "date": "2012-08-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-4389"
      },
      {
        "date": "2013-05-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-57979"
      },
      {
        "date": "2013-04-29T20:51:00",
        "db": "BID",
        "id": "55123"
      },
      {
        "date": "2012-12-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-005789"
      },
      {
        "date": "2012-08-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201208-385"
      },
      {
        "date": "2012-12-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201212-325"
      },
      {
        "date": "2024-11-21T01:43:22.643000",
        "db": "NVD",
        "id": "CVE-2012-4698"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-385"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-325"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rugged operating system private key disclosure vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-4389"
      },
      {
        "db": "BID",
        "id": "55123"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-385"
      }
    ],
    "trust": 1.5
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201208-385"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-325"
      }
    ],
    "trust": 1.2
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…