VAR-201212-0036
Vulnerability from variot - Updated: 2023-12-18 14:02Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS through 2.3.0, and RuggedMax OS through 4.2.1.4621.22 use hardcoded private keys for SSL and SSH communication, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic by leveraging the availability of these keys within ROS files at all customer installations. plural Siemens Since the product uses a hard-coded private key, there are vulnerabilities that allow the server to be impersonated and network traffic to be decrypted.Man-in-the-middle attacks (man-in-the-middle attack) Is installed in the user's environment ROS By using the private key in the file, the server can be spoofed and network traffic can be decrypted. According to the report, SSL keys can be extracted from ROS binary files using publicly available software. RuggedCom Inc is the world's leading manufacturer of high-performance network and communications equipment for industrial environments. The Rugged operating system has a hard-coded RSA private key for SSL / TLS communication. The POC code for this vulnerability has been released by Justin W. Clarke of Cylance Inc. According to a report, this vulnerability can be used for SSL between end users and RuggedCom network devices The communication is decrypted. Rugged Operating System is prone to an information-disclosure vulnerability. There is a vulnerability in Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS before 1.14.5, ROX II OS before 2.3.0, and RuggedMax OS before 4.2.1.4621.22
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201212-0036",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ruggedmax os",
"scope": "lte",
"trust": 1.8,
"vendor": "siemens",
"version": "4.2.1.4621.22"
},
{
"model": "rox i os",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "1.14.5"
},
{
"model": "rox ii os",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "2.3.0"
},
{
"model": "ros",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "3.11.0"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lte",
"trust": 0.8,
"vendor": "siemens",
"version": "3.11"
},
{
"model": "ruggedcom rugged operating system on linux i",
"scope": "lte",
"trust": 0.8,
"vendor": "siemens",
"version": "1.14.5"
},
{
"model": "ruggedcom rugged operating system on linux ii",
"scope": "lte",
"trust": 0.8,
"vendor": "siemens",
"version": "2.3.0"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "3.12"
},
{
"model": "rox i os",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "1.14.5"
},
{
"model": "rox ii os",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "2.3.0"
},
{
"model": "ruggedmax os",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "4.2.1.4621.22"
},
{
"model": "rugged operating system",
"scope": null,
"trust": 0.6,
"vendor": "ruggedcom",
"version": null
},
{
"model": "ruggedmax os",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "4.2.1.4621.22"
},
{
"model": "rox ii os",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "2.3.0"
},
{
"model": "rox i os",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "1.14.5"
},
{
"model": "ros",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.11.0"
},
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.10.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-9303"
},
{
"db": "CNVD",
"id": "CNVD-2012-4389"
},
{
"db": "BID",
"id": "55123"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-005789"
},
{
"db": "NVD",
"id": "CVE-2012-4698"
},
{
"db": "CNNVD",
"id": "CNNVD-201212-325"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ros:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.11.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:rox_i_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.14.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:rox_ii_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedmax_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.2.1.4621.22",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2012-4698"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Justin W. Clarke",
"sources": [
{
"db": "BID",
"id": "55123"
},
{
"db": "CNNVD",
"id": "CNNVD-201208-385"
}
],
"trust": 0.9
},
"cve": "CVE-2012-4698",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2012-4698",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-57979",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2012-4698",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201212-325",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-57979",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-57979"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-005789"
},
{
"db": "NVD",
"id": "CVE-2012-4698"
},
{
"db": "CNNVD",
"id": "CNNVD-201212-325"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS through 2.3.0, and RuggedMax OS through 4.2.1.4621.22 use hardcoded private keys for SSL and SSH communication, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic by leveraging the availability of these keys within ROS files at all customer installations. plural Siemens Since the product uses a hard-coded private key, there are vulnerabilities that allow the server to be impersonated and network traffic to be decrypted.Man-in-the-middle attacks (man-in-the-middle attack) Is installed in the user\u0027s environment ROS By using the private key in the file, the server can be spoofed and network traffic can be decrypted. According to the report, SSL keys can be extracted from ROS binary files using publicly available software. RuggedCom Inc is the world\u0027s leading manufacturer of high-performance network and communications equipment for industrial environments. The Rugged operating system has a hard-coded RSA private key for SSL / TLS communication. The POC code for this vulnerability has been released by Justin W. Clarke of Cylance Inc. According to a report, this vulnerability can be used for SSL between end users and RuggedCom network devices The communication is decrypted. Rugged Operating System is prone to an information-disclosure vulnerability. There is a vulnerability in Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS before 1.14.5, ROX II OS before 2.3.0, and RuggedMax OS before 4.2.1.4621.22",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-4698"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-005789"
},
{
"db": "CNVD",
"id": "CNVD-2012-9303"
},
{
"db": "CNVD",
"id": "CNVD-2012-4389"
},
{
"db": "BID",
"id": "55123"
},
{
"db": "VULHUB",
"id": "VHN-57979"
}
],
"trust": 3.06
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-4698",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-12-354-01",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-622607",
"trust": 1.7
},
{
"db": "BID",
"id": "55123",
"trust": 1.6
},
{
"db": "ICS CERT",
"id": "ICSA-12-354-01A",
"trust": 1.1
},
{
"db": "JVNDB",
"id": "JVNDB-2012-005789",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201212-325",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2012-9303",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2012-4389",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201208-385",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-57979",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-9303"
},
{
"db": "CNVD",
"id": "CNVD-2012-4389"
},
{
"db": "VULHUB",
"id": "VHN-57979"
},
{
"db": "BID",
"id": "55123"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-005789"
},
{
"db": "NVD",
"id": "CVE-2012-4698"
},
{
"db": "CNNVD",
"id": "CNNVD-201208-385"
},
{
"db": "CNNVD",
"id": "CNNVD-201212-325"
}
]
},
"id": "VAR-201212-0036",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-9303"
},
{
"db": "CNVD",
"id": "CNVD-2012-4389"
},
{
"db": "VULHUB",
"id": "VHN-57979"
}
],
"trust": 1.9416781916666666
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.2
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-9303"
},
{
"db": "CNVD",
"id": "CNVD-2012-4389"
}
]
},
"last_update_date": "2023-12-18T14:02:06.591000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "RuggedCom Security Updates",
"trust": 0.8,
"url": "http://www.ruggedcom.com/productbulletin/ros-security-page/"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.siemens.com/entry/cc/en/"
},
{
"title": "SSA-622607: RuggedCom Private Key Vulnerabilities for HTTPS/SSL and SSH",
"trust": 0.8,
"url": "https://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-622607.pdf"
},
{
"title": "\u30b7\u30fc\u30e1\u30f3\u30b9\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30d1\u30fc\u30c8\u30ca\u30fc",
"trust": 0.8,
"url": "http://www.automation.siemens.com/automation/jp/ja/solutionpartner/pages/default.aspx"
},
{
"title": "\u30b7\u30fc\u30e1\u30f3\u30b9\u30fb\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e",
"trust": 0.8,
"url": "http://www.siemens.com/answers/jp/ja/"
},
{
"title": "Patch for Rugged Operating System Hardcoded Private Key Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/26800"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-9303"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-005789"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-57979"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-005789"
},
{
"db": "NVD",
"id": "CVE-2012-4698"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-354-01.pdf"
},
{
"trust": 1.7,
"url": "http://www.ruggedcom.com/productbulletin/ros-security-page/"
},
{
"trust": 1.7,
"url": "https://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-622607.pdf"
},
{
"trust": 1.1,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-12-354-01a"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4698"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4698"
},
{
"trust": 0.6,
"url": "http://isc.sans.edu/diary.html?storyid=13948http"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/55123"
},
{
"trust": 0.3,
"url": "http://www.ruggedcom.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-9303"
},
{
"db": "CNVD",
"id": "CNVD-2012-4389"
},
{
"db": "VULHUB",
"id": "VHN-57979"
},
{
"db": "BID",
"id": "55123"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-005789"
},
{
"db": "NVD",
"id": "CVE-2012-4698"
},
{
"db": "CNNVD",
"id": "CNNVD-201208-385"
},
{
"db": "CNNVD",
"id": "CNNVD-201212-325"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2012-9303"
},
{
"db": "CNVD",
"id": "CNVD-2012-4389"
},
{
"db": "VULHUB",
"id": "VHN-57979"
},
{
"db": "BID",
"id": "55123"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-005789"
},
{
"db": "NVD",
"id": "CVE-2012-4698"
},
{
"db": "CNNVD",
"id": "CNNVD-201208-385"
},
{
"db": "CNNVD",
"id": "CNNVD-201212-325"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-12-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-9303"
},
{
"date": "2012-08-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-4389"
},
{
"date": "2012-12-23T00:00:00",
"db": "VULHUB",
"id": "VHN-57979"
},
{
"date": "2012-08-21T00:00:00",
"db": "BID",
"id": "55123"
},
{
"date": "2012-12-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-005789"
},
{
"date": "2012-12-23T21:55:01.437000",
"db": "NVD",
"id": "CVE-2012-4698"
},
{
"date": "2012-08-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201208-385"
},
{
"date": "2012-12-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201212-325"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-12-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-9303"
},
{
"date": "2012-08-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-4389"
},
{
"date": "2013-05-21T00:00:00",
"db": "VULHUB",
"id": "VHN-57979"
},
{
"date": "2013-04-29T20:51:00",
"db": "BID",
"id": "55123"
},
{
"date": "2012-12-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-005789"
},
{
"date": "2013-05-21T03:20:36.340000",
"db": "NVD",
"id": "CVE-2012-4698"
},
{
"date": "2012-08-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201208-385"
},
{
"date": "2012-12-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201212-325"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201208-385"
},
{
"db": "CNNVD",
"id": "CNNVD-201212-325"
}
],
"trust": 1.2
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rugged operating system private key disclosure vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-4389"
},
{
"db": "BID",
"id": "55123"
},
{
"db": "CNNVD",
"id": "CNNVD-201208-385"
}
],
"trust": 1.5
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201208-385"
},
{
"db": "CNNVD",
"id": "CNNVD-201212-325"
}
],
"trust": 1.2
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.