CVE-2012-4698

Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS through 2.3.0, and RuggedMax OS through 4.2.1.4621.22 use hardcoded private keys for SSL and SSH communication, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic by leveraging the availability of these keys within ROS files at all customer installations.
Configurations

Configuration 1 (hide)

cpe:2.3:o:siemens:ros:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:siemens:rox_i_os:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:siemens:rox_ii_os:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:siemens:ruggedmax_os:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-12-23 21:55

Updated : 2024-02-28 12:00


NVD link : CVE-2012-4698

Mitre link : CVE-2012-4698

CVE.ORG link : CVE-2012-4698


JSON object : View

Products Affected

siemens

  • rox_i_os
  • ros
  • rox_ii_os
  • ruggedmax_os
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor