Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS through 2.3.0, and RuggedMax OS through 4.2.1.4621.22 use hardcoded private keys for SSL and SSH communication, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic by leveraging the availability of these keys within ROS files at all customer installations.
References
Configurations
History
21 Nov 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://ics-cert.us-cert.gov/advisories/ICSA-12-354-01A - | |
References | () http://www.ruggedcom.com/productbulletin/ros-security-page/ - Vendor Advisory | |
References | () http://www.us-cert.gov/control_systems/pdf/ICSA-12-354-01.pdf - US Government Resource | |
References | () https://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-622607.pdf - Vendor Advisory |
Information
Published : 2012-12-23 21:55
Updated : 2024-11-21 01:43
NVD link : CVE-2012-4698
Mitre link : CVE-2012-4698
CVE.ORG link : CVE-2012-4698
JSON object : View
Products Affected
siemens
- rox_i_os
- ros
- ruggedmax_os
- rox_ii_os
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor