Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS through 2.3.0, and RuggedMax OS through 4.2.1.4621.22 use hardcoded private keys for SSL and SSH communication, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic by leveraging the availability of these keys within ROS files at all customer installations.
References
Link | Resource |
---|---|
http://ics-cert.us-cert.gov/advisories/ICSA-12-354-01A | |
http://www.ruggedcom.com/productbulletin/ros-security-page/ | Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-354-01.pdf | US Government Resource |
https://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-622607.pdf | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2012-12-23 21:55
Updated : 2024-02-04 18:16
NVD link : CVE-2012-4698
Mitre link : CVE-2012-4698
CVE.ORG link : CVE-2012-4698
JSON object : View
Products Affected
siemens
- rox_i_os
- rox_ii_os
- ros
- ruggedmax_os
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor