var-201502-0392
Vulnerability from variot
Buffer overflow in the integrated web server on Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allows remote attackers to execute arbitrary code via unspecified vectors. Siemens Ruggedcom WIN51xx, WIN52xx, WIN70xx and WIN72xx are broadband wireless base station products from Siemens AG. A remote attacker can exploit this vulnerability to execute arbitrary code. Ruggedcom WIN products are prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Failed exploit attempts may result in a denial-of-service condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0392", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ruggedcom", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "ss4.4.4624.34" }, { "model": "ruggedcom", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "bs4.4.4621.31" }, { "model": "ruggedcom win5100", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ruggedcom win5200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ruggedcom win7000", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ruggedcom win7200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ruggedcom", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "bs4.4.4621.32 (win70xx/win72xx)" }, { "model": "ruggedcom", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "ss4.4.4624.35 (win51xx/win52xx)" }, { "model": "win51xx/win52xx \u003css4.4.4624.35", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "win70xx/win72xx \u003cbs4.4.4621.32", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "ruggedcom", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "bs4.4.4621.31" }, { "model": "ruggedcom", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "ss4.4.4624.34" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "ruggedcom", "version": "*" } ], "sources": [ { "db": "IVD", "id": "a500d834-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00847" }, { "db": "JVNDB", "id": "JVNDB-2015-001342" }, { "db": "NVD", "id": "CVE-2015-1449" }, { "db": "CNNVD", "id": "CNNVD-201502-020" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "bs4.4.4621.31", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win7000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win7200:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ss4.4.4624.34", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win5100:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win5200:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-1449" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "72522" } ], "trust": 0.3 }, "cve": "CVE-2015-1449", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2015-1449", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2015-00847", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "a500d834-2351-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-79410", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-1449", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2015-00847", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201502-020", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "a500d834-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-79410", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "a500d834-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00847" }, { "db": "VULHUB", "id": "VHN-79410" }, { "db": "JVNDB", "id": "JVNDB-2015-001342" }, { "db": "NVD", "id": "CVE-2015-1449" }, { "db": "CNNVD", "id": "CNNVD-201502-020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in the integrated web server on Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allows remote attackers to execute arbitrary code via unspecified vectors. Siemens Ruggedcom WIN51xx, WIN52xx, WIN70xx and WIN72xx are broadband wireless base station products from Siemens AG. A remote attacker can exploit this vulnerability to execute arbitrary code. Ruggedcom WIN products are prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Failed exploit attempts may result in a denial-of-service condition", "sources": [ { "db": "NVD", "id": "CVE-2015-1449" }, { "db": "JVNDB", "id": "JVNDB-2015-001342" }, { "db": "CNVD", "id": "CNVD-2015-00847" }, { "db": "BID", "id": "72522" }, { "db": "IVD", "id": "a500d834-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-79410" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-1449", "trust": 3.6 }, { "db": "SIEMENS", "id": "SSA-753139", "trust": 2.3 }, { "db": "BID", "id": "72522", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201502-020", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2015-00847", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-001342", "trust": 0.8 }, { "db": "IVD", "id": "A500D834-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-79410", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "a500d834-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00847" }, { "db": "VULHUB", "id": "VHN-79410" }, { "db": "BID", "id": "72522" }, { "db": "JVNDB", "id": "JVNDB-2015-001342" }, { "db": "NVD", "id": "CVE-2015-1449" }, { "db": "CNNVD", "id": "CNNVD-201502-020" } ] }, "id": "VAR-201502-0392", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "a500d834-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00847" }, { "db": "VULHUB", "id": "VHN-79410" } ], "trust": 1.9 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "a500d834-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00847" } ] }, "last_update_date": "2023-12-18T12:38:04.671000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-753139", "trust": 0.8, "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-753139.pdf" }, { "title": "Patches for multiple Siemens Ruggedcom product buffer overflow vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/54943" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00847" }, { "db": "JVNDB", "id": "JVNDB-2015-001342" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-79410" }, { "db": "JVNDB", "id": "JVNDB-2015-001342" }, { "db": "NVD", "id": "CVE-2015-1449" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-753139.pdf" }, { "trust": 1.4, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1449" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1449" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00847" }, { "db": "VULHUB", "id": "VHN-79410" }, { "db": "BID", "id": "72522" }, { "db": "JVNDB", "id": "JVNDB-2015-001342" }, { "db": "NVD", "id": "CVE-2015-1449" }, { "db": "CNNVD", "id": "CNNVD-201502-020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "a500d834-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00847" }, { "db": "VULHUB", "id": "VHN-79410" }, { "db": "BID", "id": "72522" }, { "db": "JVNDB", "id": "JVNDB-2015-001342" }, { "db": "NVD", "id": "CVE-2015-1449" }, { "db": "CNNVD", "id": "CNNVD-201502-020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-04T00:00:00", "db": "IVD", "id": "a500d834-2351-11e6-abef-000c29c66e3d" }, { "date": "2015-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2015-00847" }, { "date": "2015-02-02T00:00:00", "db": "VULHUB", "id": "VHN-79410" }, { "date": "2015-02-06T00:00:00", "db": "BID", "id": "72522" }, { "date": "2015-02-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001342" }, { "date": "2015-02-02T15:59:09.223000", "db": "NVD", "id": "CVE-2015-1449" }, { "date": "2015-02-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2015-00847" }, { "date": "2015-02-04T00:00:00", "db": "VULHUB", "id": "VHN-79410" }, { "date": "2015-02-06T00:00:00", "db": "BID", "id": "72522" }, { "date": "2015-02-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001342" }, { "date": "2015-02-04T05:27:31.590000", "db": "NVD", "id": "CVE-2015-1449" }, { "date": "2015-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Siemens Ruggedcom WIN Integrated device firmware Web Server buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001342" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "a500d834-2351-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201502-020" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.