var-201502-0369
Vulnerability from variot
Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allow context-dependent attackers to discover password hashes by reading (1) files or (2) security logs. Siemens Ruggedcom WIN51xx, WIN52xx, WIN70xx and WIN72xx are broadband wireless base station products from Siemens AG. Security vulnerabilities exist in several Siemens Ruggedcom products. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0369", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ruggedcom", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "ss4.4.4624.34" }, { "model": "ruggedcom", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "bs4.4.4621.31" }, { "model": "ruggedcom win5100", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ruggedcom win5200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ruggedcom win7000", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ruggedcom win7200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ruggedcom", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "bs4.4.4621.32 (win70xx/win72xx)" }, { "model": "ruggedcom", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "ss4.4.4624.35 (win51xx/win52xx)" }, { "model": "win51xx/win52xx \u003css4.4.4624.35", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "win70xx/win72xx \u003cbs4.4.4621.32", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "ruggedcom", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "bs4.4.4621.31" }, { "model": "ruggedcom", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "ss4.4.4624.34" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "ruggedcom", "version": "*" }, { "model": "ruggedcom win7200", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "ruggedcom win7000", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "ruggedcom win5200", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "ruggedcom win5100", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "ruggedcom win7200 bs4.4.4621.32", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "ruggedcom win7000 bs4.4.4621.32", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "ruggedcom win5200 ss4.4.4624.35", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "ruggedcom win5100 ss4.4.4624.35", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null } ], "sources": [ { "db": "IVD", "id": "a4f5721e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00845" }, { "db": "BID", "id": "72523" }, { "db": "JVNDB", "id": "JVNDB-2015-001344" }, { "db": "NVD", "id": "CVE-2015-1357" }, { "db": "CNNVD", "id": "CNNVD-201502-018" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "bs4.4.4621.31", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ss4.4.4624.34", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win5100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win5200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-1357" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "72523" } ], "trust": 0.3 }, "cve": "CVE-2015-1357", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-1357", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CNVD-2015-00845", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "a4f5721e-2351-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.2, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-79318", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-1357", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-00845", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201502-018", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "a4f5721e-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-79318", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2015-1357", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "a4f5721e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00845" }, { "db": "VULHUB", "id": "VHN-79318" }, { "db": "VULMON", "id": "CVE-2015-1357" }, { "db": "JVNDB", "id": "JVNDB-2015-001344" }, { "db": "NVD", "id": "CVE-2015-1357" }, { "db": "CNNVD", "id": "CNNVD-201502-018" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allow context-dependent attackers to discover password hashes by reading (1) files or (2) security logs. Siemens Ruggedcom WIN51xx, WIN52xx, WIN70xx and WIN72xx are broadband wireless base station products from Siemens AG. Security vulnerabilities exist in several Siemens Ruggedcom products. \nAttackers can exploit this issue to obtain sensitive information that may lead to further attacks", "sources": [ { "db": "NVD", "id": "CVE-2015-1357" }, { "db": "JVNDB", "id": "JVNDB-2015-001344" }, { "db": "CNVD", "id": "CNVD-2015-00845" }, { "db": "BID", "id": "72523" }, { "db": "IVD", "id": "a4f5721e-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-79318" }, { "db": "VULMON", "id": "CVE-2015-1357" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-1357", "trust": 3.7 }, { "db": "SIEMENS", "id": "SSA-753139", "trust": 2.4 }, { "db": "BID", "id": "72523", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201502-018", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2015-00845", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-001344", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-15-034-02", "trust": 0.4 }, { "db": "IVD", "id": "A4F5721E-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-79318", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-1357", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "a4f5721e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00845" }, { "db": "VULHUB", "id": "VHN-79318" }, { "db": "VULMON", "id": "CVE-2015-1357" }, { "db": "BID", "id": "72523" }, { "db": "JVNDB", "id": "JVNDB-2015-001344" }, { "db": "NVD", "id": "CVE-2015-1357" }, { "db": "CNNVD", "id": "CNNVD-201502-018" } ] }, "id": "VAR-201502-0369", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "a4f5721e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00845" }, { "db": "VULHUB", "id": "VHN-79318" } ], "trust": 1.9 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "a4f5721e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00845" } ] }, "last_update_date": "2023-12-18T12:38:04.718000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-753139", "trust": 0.8, "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-753139.pdf" }, { "title": "Patches for several Siemens Ruggedcom product information disclosure vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/54946" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00845" }, { "db": "JVNDB", "id": "JVNDB-2015-001344" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-79318" }, { "db": "JVNDB", "id": "JVNDB-2015-001344" }, { "db": "NVD", "id": "CVE-2015-1357" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-753139.pdf" }, { "trust": 1.4, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1357" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1357" }, { "trust": 0.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-034-02" }, { "trust": 0.3, "url": "http://www.siemens.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=37349" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00845" }, { "db": "VULHUB", "id": "VHN-79318" }, { "db": "VULMON", "id": "CVE-2015-1357" }, { "db": "BID", "id": "72523" }, { "db": "JVNDB", "id": "JVNDB-2015-001344" }, { "db": "NVD", "id": "CVE-2015-1357" }, { "db": "CNNVD", "id": "CNNVD-201502-018" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "a4f5721e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00845" }, { "db": "VULHUB", "id": "VHN-79318" }, { "db": "VULMON", "id": "CVE-2015-1357" }, { "db": "BID", "id": "72523" }, { "db": "JVNDB", "id": "JVNDB-2015-001344" }, { "db": "NVD", "id": "CVE-2015-1357" }, { "db": "CNNVD", "id": "CNNVD-201502-018" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-04T00:00:00", "db": "IVD", "id": "a4f5721e-2351-11e6-abef-000c29c66e3d" }, { "date": "2015-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2015-00845" }, { "date": "2015-02-02T00:00:00", "db": "VULHUB", "id": "VHN-79318" }, { "date": "2015-02-02T00:00:00", "db": "VULMON", "id": "CVE-2015-1357" }, { "date": "2015-02-03T00:00:00", "db": "BID", "id": "72523" }, { "date": "2015-02-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001344" }, { "date": "2015-02-02T15:59:03.240000", "db": "NVD", "id": "CVE-2015-1357" }, { "date": "2015-02-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-018" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2015-00845" }, { "date": "2015-02-04T00:00:00", "db": "VULHUB", "id": "VHN-79318" }, { "date": "2015-02-04T00:00:00", "db": "VULMON", "id": "CVE-2015-1357" }, { "date": "2015-02-03T00:00:00", "db": "BID", "id": "72523" }, { "date": "2015-02-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001344" }, { "date": "2015-02-04T05:19:39.717000", "db": "NVD", "id": "CVE-2015-1357" }, { "date": "2015-02-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-018" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-018" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Siemens Ruggedcom WIN Vulnerability to get password hash on device", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001344" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-018" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.