VAR-201312-0274
Vulnerability from variot - Updated: 2023-12-18 12:30The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote authenticated users to bypass intended restrictions on administrative actions by leveraging access to a (1) guest or (2) operator account. RuggedCom Inc. is the world's leading manufacturer of high performance networking and communications equipment for industrial environments. The RuggedCom Rugged Operating System listens to TCP 443 port web servers for authentication bypass and hijacking session vulnerabilities, allowing remote non-privileged accounts (such as Guest or Operator) to perform some limited management operations over the network. RuggedCom Rugged Operating System is prone to a remote authentication-bypass and session-hijacking vulnerabilities. Exploiting these issues can allow attackers to bypass authentication mechanism or hijack another user's session and gain unauthorized access to the victim's account on the affected device. Versions prior to Rugged Operating System 3.12.2 are vulnerable. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201312-0274",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.12.2"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "(ros) 3.12.2"
},
{
"model": "rugged operating system",
"scope": "lt",
"trust": 0.6,
"vendor": "ruggedcom",
"version": "3.12.2"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.6.6"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.5.4"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.12.1"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.4.9"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.2.5"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.3.6"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.8.5"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.11.4"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.12"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.7.9"
},
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.12.1"
},
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.12.0"
},
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.11.0"
},
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.10.1"
},
{
"model": "rugged operating system",
"scope": "ne",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.12.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.2.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.3.6"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.4.9"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.5.4"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.6.6"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.7.9"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.8.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.9.3"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.10.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.11.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.11.4"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "3.12"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ruggedcom rugged operating system",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "6364538c-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-14994"
},
{
"db": "BID",
"id": "64155"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005587"
},
{
"db": "NVD",
"id": "CVE-2013-6926"
},
{
"db": "CNNVD",
"id": "CNNVD-201312-350"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.12.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-6926"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reported by the vendor",
"sources": [
{
"db": "BID",
"id": "64155"
}
],
"trust": 0.3
},
"cve": "CVE-2013-6926",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 8.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2013-6926",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CNVD-2013-14994",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "6364538c-2352-11e6-abef-000c29c66e3d",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 8.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-66928",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-6926",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2013-14994",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201312-350",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "6364538c-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-66928",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "6364538c-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-14994"
},
{
"db": "VULHUB",
"id": "VHN-66928"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005587"
},
{
"db": "NVD",
"id": "CVE-2013-6926"
},
{
"db": "CNNVD",
"id": "CNNVD-201312-350"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote authenticated users to bypass intended restrictions on administrative actions by leveraging access to a (1) guest or (2) operator account. RuggedCom Inc. is the world\u0027s leading manufacturer of high performance networking and communications equipment for industrial environments. The RuggedCom Rugged Operating System listens to TCP 443 port web servers for authentication bypass and hijacking session vulnerabilities, allowing remote non-privileged accounts (such as Guest or Operator) to perform some limited management operations over the network. RuggedCom Rugged Operating System is prone to a remote authentication-bypass and session-hijacking vulnerabilities. \nExploiting these issues can allow attackers to bypass authentication mechanism or hijack another user\u0027s session and gain unauthorized access to the victim\u0027s account on the affected device. \nVersions prior to Rugged Operating System 3.12.2 are vulnerable. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-6926"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005587"
},
{
"db": "CNVD",
"id": "CNVD-2013-14994"
},
{
"db": "BID",
"id": "64155"
},
{
"db": "IVD",
"id": "6364538c-2352-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-66928"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-6926",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-13-340-01",
"trust": 3.4
},
{
"db": "SIEMENS",
"id": "SSA-324789",
"trust": 2.6
},
{
"db": "CNNVD",
"id": "CNNVD-201312-350",
"trust": 0.9
},
{
"db": "BID",
"id": "64155",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2013-14994",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005587",
"trust": 0.8
},
{
"db": "IVD",
"id": "6364538C-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-66928",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "6364538c-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-14994"
},
{
"db": "VULHUB",
"id": "VHN-66928"
},
{
"db": "BID",
"id": "64155"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005587"
},
{
"db": "NVD",
"id": "CVE-2013-6926"
},
{
"db": "CNNVD",
"id": "CNNVD-201312-350"
}
]
},
"id": "VAR-201312-0274",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "6364538c-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-14994"
},
{
"db": "VULHUB",
"id": "VHN-66928"
}
],
"trust": 1.5333678750000002
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "6364538c-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-14994"
}
]
},
"last_update_date": "2023-12-18T12:30:49.170000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-324789",
"trust": 0.8,
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-324789.pdf"
},
{
"title": "RuggedCom Rugged Operating System verifies patches that bypass the vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/41535"
},
{
"title": "Siemens RuggedCom ROS Fixes for permissions and access control issues vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180262"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-14994"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005587"
},
{
"db": "CNNVD",
"id": "CNNVD-201312-350"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-863",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-66928"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005587"
},
{
"db": "NVD",
"id": "CVE-2013-6926"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-13-340-01"
},
{
"trust": 2.6,
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-324789.pdf"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6926"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6926"
},
{
"trust": 0.3,
"url": "http://www.ruggedcom.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-14994"
},
{
"db": "VULHUB",
"id": "VHN-66928"
},
{
"db": "BID",
"id": "64155"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005587"
},
{
"db": "NVD",
"id": "CVE-2013-6926"
},
{
"db": "CNNVD",
"id": "CNNVD-201312-350"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "6364538c-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-14994"
},
{
"db": "VULHUB",
"id": "VHN-66928"
},
{
"db": "BID",
"id": "64155"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005587"
},
{
"db": "NVD",
"id": "CVE-2013-6926"
},
{
"db": "CNNVD",
"id": "CNNVD-201312-350"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-12-12T00:00:00",
"db": "IVD",
"id": "6364538c-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2013-12-11T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-14994"
},
{
"date": "2013-12-17T00:00:00",
"db": "VULHUB",
"id": "VHN-66928"
},
{
"date": "2013-12-06T00:00:00",
"db": "BID",
"id": "64155"
},
{
"date": "2013-12-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-005587"
},
{
"date": "2013-12-17T04:46:45.923000",
"db": "NVD",
"id": "CVE-2013-6926"
},
{
"date": "2013-12-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201312-350"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-12-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-14994"
},
{
"date": "2013-12-17T00:00:00",
"db": "VULHUB",
"id": "VHN-66928"
},
{
"date": "2013-12-06T00:00:00",
"db": "BID",
"id": "64155"
},
{
"date": "2013-12-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-005587"
},
{
"date": "2022-02-01T16:53:39.640000",
"db": "NVD",
"id": "CVE-2013-6926"
},
{
"date": "2022-02-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201312-350"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201312-350"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens RuggedCom ROS Integrated HTTPS Vulnerability that bypasses administrator action restrictions on the server",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-005587"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201312-350"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.