VAR-201404-0628
Vulnerability from variot - Updated: 2023-12-18 13:39The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G, ROS 3.12, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (interface outage) via crafted HTTP packets. RuggedCom Inc. is the world's leading manufacturer of high performance networking and communications equipment for industrial environments. The WEB server listening to port 80 in the RuggedCom Rugged Operating System system fails to properly handle the user-submitted specially crafted messages, allowing the attacker to submit a specially made request to crash the WEB interface. This vulnerability does not affect the HTTPS service and switching functions. RuggedCom Rugged Operating System is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the application resulting in denial-of-service conditions. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany. The following versions are affected: ROS versions prior to 3.11, 3.11 versions prior to ROS 3.11.5 for RS950G products, ROS version 3.12, ROS version 4.0 for RS950G products
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201404-0628",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 1.4,
"vendor": "siemens",
"version": "3.12"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.11.5"
},
{
"model": "ruggedcom rugged operating system",
"scope": "gt",
"trust": 1.0,
"vendor": "siemens",
"version": "4.0"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.12.4"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.11.0"
},
{
"model": "ruggedcom rugged operating system",
"scope": "gt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.11.0"
},
{
"model": "ruggedcom rugged operating system",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "3.12"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "4.1.0"
},
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.9,
"vendor": "ruggedcom",
"version": "3.10.1"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "4.0 for rsg2488"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "3.11"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.11.5 for rs950g"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.6.6"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.5.4"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "4.0"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.4.9"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.11"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.2.5"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.3.6"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.10.1"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.7.9"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "3.2.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "3.3.6"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "3.4.9"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "3.5.4"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "3.6.6"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "3.7.9"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "3.8.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "3.9.3"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "3.10.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "3.11"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "3.12"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ruggedcom rugged operating system",
"version": "4.0"
}
],
"sources": [
{
"db": "IVD",
"id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
},
{
"db": "CNVD",
"id": "CNVD-2014-02085"
},
{
"db": "BID",
"id": "66522"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001858"
},
{
"db": "NVD",
"id": "CVE-2014-2590"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-011"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.11.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.12.4",
"versionStartIncluding": "3.12",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.11.5",
"versionStartExcluding": "3.11.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_rs950g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.1.0",
"versionStartExcluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_rsg2488:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2590"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Aivar Liimets of Martem Telecontrol Systems.",
"sources": [
{
"db": "BID",
"id": "66522"
}
],
"trust": 0.3
},
"cve": "CVE-2014-2590",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-2590",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-02085",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "1c846bb4-2352-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-70529",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-2590",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2014-02085",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201404-011",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "1c846bb4-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-70529",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
},
{
"db": "CNVD",
"id": "CNVD-2014-02085"
},
{
"db": "VULHUB",
"id": "VHN-70529"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001858"
},
{
"db": "NVD",
"id": "CVE-2014-2590"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-011"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G, ROS 3.12, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (interface outage) via crafted HTTP packets. RuggedCom Inc. is the world\u0027s leading manufacturer of high performance networking and communications equipment for industrial environments. The WEB server listening to port 80 in the RuggedCom Rugged Operating System system fails to properly handle the user-submitted specially crafted messages, allowing the attacker to submit a specially made request to crash the WEB interface. This vulnerability does not affect the HTTPS service and switching functions. RuggedCom Rugged Operating System is prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to crash the application resulting in denial-of-service conditions. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany. The following versions are affected: ROS versions prior to 3.11, 3.11 versions prior to ROS 3.11.5 for RS950G products, ROS version 3.12, ROS version 4.0 for RS950G products",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2590"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001858"
},
{
"db": "CNVD",
"id": "CNVD-2014-02085"
},
{
"db": "BID",
"id": "66522"
},
{
"db": "IVD",
"id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
},
{
"db": "VULHUB",
"id": "VHN-70529"
}
],
"trust": 2.88
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-2590",
"trust": 3.8
},
{
"db": "ICS CERT",
"id": "ICSA-14-087-01",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-831997",
"trust": 1.7
},
{
"db": "CNVD",
"id": "CNVD-2014-02085",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201404-011",
"trust": 1.0
},
{
"db": "BID",
"id": "66522",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001858",
"trust": 0.8
},
{
"db": "IVD",
"id": "1C846BB4-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "CB580A39-0E4D-4715-96CE-4A91D1D302D2",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-70529",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
},
{
"db": "CNVD",
"id": "CNVD-2014-02085"
},
{
"db": "VULHUB",
"id": "VHN-70529"
},
{
"db": "BID",
"id": "66522"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001858"
},
{
"db": "NVD",
"id": "CVE-2014-2590"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-011"
}
]
},
"id": "VAR-201404-0628",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
},
{
"db": "CNVD",
"id": "CNVD-2014-02085"
},
{
"db": "VULHUB",
"id": "VHN-70529"
}
],
"trust": 1.7333678750000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
},
{
"db": "CNVD",
"id": "CNVD-2014-02085"
}
]
},
"last_update_date": "2023-12-18T13:39:57.330000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-831997",
"trust": 0.8,
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-831997.pdf"
},
{
"title": "RuggedCom Rugged Operating System WEB Interface Denial of Service Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/44605"
},
{
"title": "Siemens RuggedCom ROS Enter the fix for the verification error vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180265"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02085"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001858"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-011"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-306",
"trust": 1.0
},
{
"problemtype": "CWE-20",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-70529"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001858"
},
{
"db": "NVD",
"id": "CVE-2014-2590"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-14-087-01"
},
{
"trust": 1.7,
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-831997.pdf"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2590"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2590"
},
{
"trust": 0.6,
"url": "http://www.siemens.com/innovation/en/technology-focus/siemens-cert/cert-security-advisories.htm"
},
{
"trust": 0.3,
"url": "http://www.ruggedcom.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02085"
},
{
"db": "VULHUB",
"id": "VHN-70529"
},
{
"db": "BID",
"id": "66522"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001858"
},
{
"db": "NVD",
"id": "CVE-2014-2590"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-011"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
},
{
"db": "CNVD",
"id": "CNVD-2014-02085"
},
{
"db": "VULHUB",
"id": "VHN-70529"
},
{
"db": "BID",
"id": "66522"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001858"
},
{
"db": "NVD",
"id": "CVE-2014-2590"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-011"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-04-02T00:00:00",
"db": "IVD",
"id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2014-04-02T00:00:00",
"db": "IVD",
"id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
},
{
"date": "2014-04-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-02085"
},
{
"date": "2014-04-01T00:00:00",
"db": "VULHUB",
"id": "VHN-70529"
},
{
"date": "2014-03-28T00:00:00",
"db": "BID",
"id": "66522"
},
{
"date": "2014-04-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001858"
},
{
"date": "2014-04-01T06:29:39.423000",
"db": "NVD",
"id": "CVE-2014-2590"
},
{
"date": "2014-04-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201404-011"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-04-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-02085"
},
{
"date": "2014-04-01T00:00:00",
"db": "VULHUB",
"id": "VHN-70529"
},
{
"date": "2014-05-29T01:06:00",
"db": "BID",
"id": "66522"
},
{
"date": "2014-04-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001858"
},
{
"date": "2022-02-01T16:53:42.707000",
"db": "NVD",
"id": "CVE-2014-2590"
},
{
"date": "2022-02-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201404-011"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201404-011"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RuggedCom Rugged Operating System WEB Interface Denial of Service Vulnerability",
"sources": [
{
"db": "IVD",
"id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
},
{
"db": "CNVD",
"id": "CNVD-2014-02085"
}
],
"trust": 1.0
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "access control error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201404-011"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.