VAR-201204-0037

Vulnerability from variot - Updated: 2024-04-20 23:04

RuggedCom Rugged Operating System (ROS) before 3.3 has a factory account with a password derived from the MAC Address field in a banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) SSH or (2) HTTPS session, a different vulnerability than CVE-2012-1803. RuggedCom Inc is the world's leading manufacturer of high-performance networking and communication equipment for industrial environments. The ROS operating system for RuggedCom RuggedSwitches and RuggedServers includes a built-in user account "factory" by default, and it cannot be disabled. ROS also supports HTTP(S) and SSH services. It is currently incorrect whether these services use the factory, and it is also unclear whether successful or unsuccessful login attempts will be recorded. Ros is prone to a remote security vulnerability. ----------------------------------------------------------------------

Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch


TITLE: RuggedCom Rugged Operating System Undocumented Account Security Issue

SECUNIA ADVISORY ID: SA48963

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48963/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48963

RELEASE DATE: 2012-04-25

DISCUSS ADVISORY: http://secunia.com/advisories/48963/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/48963/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=48963

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: JC CREW has reported a security issue in RuggedCom Rugged Operating System (ROS), which can be exploited by malicious people to bypass certain security restrictions.

SOLUTION: Restrict access to trusted hosts only.

PROVIDED AND/OR DISCOVERED BY: JC CREW

ORIGINAL ADVISORY: JC CREW: http://archives.neohapsis.com/archives/fulldisclosure/2012-04/0276.html

US-CERT: http://www.kb.cert.org/vuls/id/889195

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201204-0037",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.3.0"
      },
      {
        "model": "ros",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "ruggedcom",
        "version": "3.2"
      },
      {
        "model": "rugged operating system",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ruggedcom",
        "version": "3.3"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ruggedcom",
        "version": "3.9.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ros",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ec100d6a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "db": "BID",
        "id": "78199"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002167"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-542"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2441"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "3.3.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2441"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "jc",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2012-2441",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.8,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 8.5,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2012-2441",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.8,
            "id": "ec100d6a-2353-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-2441",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201204-542",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "ec100d6a-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ec100d6a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002167"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-542"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2441"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "RuggedCom Rugged Operating System (ROS) before 3.3 has a factory account with a password derived from the MAC Address field in a banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) SSH or (2) HTTPS session, a different vulnerability than CVE-2012-1803. RuggedCom Inc is the world\u0027s leading manufacturer of high-performance networking and communication equipment for industrial environments. The ROS operating system for RuggedCom RuggedSwitches and RuggedServers includes a built-in user account \"factory\" by default, and it cannot be disabled. ROS also supports HTTP(S) and SSH services. It is currently incorrect whether these services use the factory, and it is also unclear whether successful or unsuccessful login attempts will be recorded. Ros is prone to a remote security vulnerability. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nRuggedCom Rugged Operating System Undocumented Account Security Issue\n\nSECUNIA ADVISORY ID:\nSA48963\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48963/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48963\n\nRELEASE DATE:\n2012-04-25\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48963/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48963/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48963\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nJC CREW has reported a security issue in RuggedCom Rugged Operating\nSystem (ROS), which can be exploited by malicious people to bypass\ncertain security restrictions. \n\nSOLUTION:\nRestrict access to trusted hosts only. \n\nPROVIDED AND/OR DISCOVERED BY:\nJC CREW\n\nORIGINAL ADVISORY:\nJC CREW:\nhttp://archives.neohapsis.com/archives/fulldisclosure/2012-04/0276.html\n\nUS-CERT:\nhttp://www.kb.cert.org/vuls/id/889195\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002167"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "db": "BID",
        "id": "78199"
      },
      {
        "db": "IVD",
        "id": "ec100d6a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "PACKETSTORM",
        "id": "112186"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#889195",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2441",
        "trust": 2.9
      },
      {
        "db": "ICS CERT ALERT",
        "id": "ICS-ALERT-12-116-01A",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "53215",
        "trust": 1.2
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-542",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-146-01A",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002167",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "78199",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "EC100D6A-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "SECUNIA",
        "id": "48963",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "112186",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ec100d6a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "db": "BID",
        "id": "78199"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002167"
      },
      {
        "db": "PACKETSTORM",
        "id": "112186"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-542"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2441"
      }
    ]
  },
  "id": "VAR-201204-0037",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "ec100d6a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      }
    ],
    "trust": 1.4444674833333333
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ec100d6a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      }
    ]
  },
  "last_update_date": "2024-04-20T23:04:08.913000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Latest news on ROS Device Security Issue",
        "trust": 0.8,
        "url": "http://www.ruggedcom.com/productbulletin/ros-security-page/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002167"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-521",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-310",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002167"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2441"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://www.kb.cert.org/vuls/id/889195"
      },
      {
        "trust": 2.7,
        "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-116-01a.pdf"
      },
      {
        "trust": 1.9,
        "url": "http://arstechnica.com/business/news/2012/04/backdoor-in-mission-critical-hardware-threatens-power-traffic-control-systems.ars"
      },
      {
        "trust": 1.9,
        "url": "http://www.wired.com/threatlevel/2012/04/ruggedcom-backdoor/"
      },
      {
        "trust": 1.9,
        "url": "http://seclists.org/fulldisclosure/2012/apr/277"
      },
      {
        "trust": 1.9,
        "url": "http://www.ruggedcom.com/productbulletin/ros-security-page/"
      },
      {
        "trust": 1.6,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75244"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2441"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-146-01a.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu889195/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2441"
      },
      {
        "trust": 0.6,
        "url": "http://www.kb.cert.org/vuls/id/889195http"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/53215"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48963"
      },
      {
        "trust": 0.1,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-04/0276.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/psi_30_beta_launch"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48963/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48963/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "db": "BID",
        "id": "78199"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002167"
      },
      {
        "db": "PACKETSTORM",
        "id": "112186"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-542"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2441"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "ec100d6a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "db": "BID",
        "id": "78199"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002167"
      },
      {
        "db": "PACKETSTORM",
        "id": "112186"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-542"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2441"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-04-28T00:00:00",
        "db": "IVD",
        "id": "ec100d6a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-04-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "date": "2012-04-27T00:00:00",
        "db": "BID",
        "id": "78199"
      },
      {
        "date": "2012-05-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002167"
      },
      {
        "date": "2012-04-25T02:37:37",
        "db": "PACKETSTORM",
        "id": "112186"
      },
      {
        "date": "2012-04-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "date": "2012-04-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201204-542"
      },
      {
        "date": "2012-04-28T00:55:01.360000",
        "db": "NVD",
        "id": "CVE-2012-2441"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-2154"
      },
      {
        "date": "2012-04-27T00:00:00",
        "db": "BID",
        "id": "78199"
      },
      {
        "date": "2012-05-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002167"
      },
      {
        "date": "2012-05-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "date": "2022-02-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201204-542"
      },
      {
        "date": "2022-02-01T16:53:34.140000",
        "db": "NVD",
        "id": "CVE-2012-2441"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-542"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "RuggedCom of  Rugged Operating System (ROS) Vulnerabilities that gain access privileges",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002167"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-542"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…