VAR-201312-0273

Vulnerability from variot - Updated: 2023-12-18 12:30

The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote attackers to hijack web sessions by predicting a session id value. Supplementary information : CWE Vulnerability type by CWE-330: Use of Insufficiently Random Values ( Insufficient random value used ) Has been identified. RuggedCom Inc. is the world's leading manufacturer of high performance networking and communications equipment for industrial environments. The attacker must know the administrator client IP address to attack. RuggedCom Rugged Operating System is prone to a remote authentication-bypass and session-hijacking vulnerabilities. Exploiting these issues can allow attackers to bypass authentication mechanism or hijack another user's session and gain unauthorized access to the victim's account on the affected device. Versions prior to Rugged Operating System 3.12.2 are vulnerable. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0273",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.12.2"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "(ros) 3.12.2"
      },
      {
        "model": "rugged operating system",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "ruggedcom",
        "version": "3.12.2"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.12.1"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.9.3"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.2.5"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.11.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.3.6"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.8.5"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.10.1"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.11.4"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.12"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.7.9"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ruggedcom",
        "version": "3.12.1"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ruggedcom",
        "version": "3.12.0"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ruggedcom",
        "version": "3.11.0"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ruggedcom",
        "version": "3.10.1"
      },
      {
        "model": "rugged operating system",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ruggedcom",
        "version": "3.12.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.3.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.4.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.5.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.7.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.8.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.9.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.10.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.11.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.11.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ruggedcom rugged operating system",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "63685bd0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      },
      {
        "db": "BID",
        "id": "64155"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005586"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6925"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-349"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "3.12.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-6925"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Reported by the vendor",
    "sources": [
      {
        "db": "BID",
        "id": "64155"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-6925",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 8.3,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2013-6925",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2013-14993",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "63685bd0-2352-11e6-abef-000c29c66e3d",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-66927",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-6925",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-14993",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201312-349",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "63685bd0-2352-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-66927",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "63685bd0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66927"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005586"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6925"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-349"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote attackers to hijack web sessions by predicting a session id value. Supplementary information : CWE Vulnerability type by CWE-330: Use of Insufficiently Random Values ( Insufficient random value used ) Has been identified. RuggedCom Inc. is the world\u0027s leading manufacturer of high performance networking and communications equipment for industrial environments. The attacker must know the administrator client IP address to attack. RuggedCom Rugged Operating System is prone to a remote authentication-bypass and session-hijacking vulnerabilities. \nExploiting these issues can allow attackers to bypass authentication mechanism or hijack another user\u0027s session and gain unauthorized access to the victim\u0027s account on the affected device. \nVersions prior to Rugged Operating System 3.12.2 are vulnerable. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-6925"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005586"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      },
      {
        "db": "BID",
        "id": "64155"
      },
      {
        "db": "IVD",
        "id": "63685bd0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66927"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-6925",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-13-340-01",
        "trust": 3.4
      },
      {
        "db": "SIEMENS",
        "id": "SSA-324789",
        "trust": 2.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-349",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "64155",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-14993",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005586",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "63685BD0-2352-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-66927",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "63685bd0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66927"
      },
      {
        "db": "BID",
        "id": "64155"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005586"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6925"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-349"
      }
    ]
  },
  "id": "VAR-201312-0273",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "63685bd0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66927"
      }
    ],
    "trust": 1.5333678750000002
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "63685bd0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:30:49.208000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SSA-324789",
        "trust": 0.8,
        "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-324789.pdf"
      },
      {
        "title": "RuggedCom Rugged Operating System session hijacking vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/41534"
      },
      {
        "title": "Siemens RuggedCom ROS Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180261"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005586"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-349"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-330",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005586"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6925"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-340-01"
      },
      {
        "trust": 2.6,
        "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-324789.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6925"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6925"
      },
      {
        "trust": 0.3,
        "url": "http://www.ruggedcom.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66927"
      },
      {
        "db": "BID",
        "id": "64155"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005586"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6925"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-349"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "63685bd0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66927"
      },
      {
        "db": "BID",
        "id": "64155"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005586"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6925"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-349"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-12-12T00:00:00",
        "db": "IVD",
        "id": "63685bd0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2013-12-11T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      },
      {
        "date": "2013-12-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-66927"
      },
      {
        "date": "2013-12-06T00:00:00",
        "db": "BID",
        "id": "64155"
      },
      {
        "date": "2013-12-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005586"
      },
      {
        "date": "2013-12-17T04:46:45.910000",
        "db": "NVD",
        "id": "CVE-2013-6925"
      },
      {
        "date": "2013-12-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-349"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-12-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      },
      {
        "date": "2013-12-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-66927"
      },
      {
        "date": "2013-12-06T00:00:00",
        "db": "BID",
        "id": "64155"
      },
      {
        "date": "2013-12-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005586"
      },
      {
        "date": "2022-02-01T16:53:37.440000",
        "db": "NVD",
        "id": "CVE-2013-6925"
      },
      {
        "date": "2022-02-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-349"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-349"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "RuggedCom Rugged Operating System Session Hijacking Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "63685bd0-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-14993"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "security feature problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-349"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…