CVE-2015-1357

Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allow context-dependent attackers to discover password hashes by reading (1) files or (2) security logs.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:siemens:ruggedcom_win5100:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_win5200:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:25

Type Values Removed Values Added
References () http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-753139.pdf - Vendor Advisory () http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-753139.pdf - Vendor Advisory

Information

Published : 2015-02-02 15:59

Updated : 2024-11-21 02:25


NVD link : CVE-2015-1357

Mitre link : CVE-2015-1357

CVE.ORG link : CVE-2015-1357


JSON object : View

Products Affected

siemens

  • ruggedcom_win7000
  • ruggedcom_firmware
  • ruggedcom_win5200
  • ruggedcom_win7200
  • ruggedcom_win5100
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor