[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-1803Date: (C)2012-04-27   (M)2023-12-22


RuggedCom Rugged Operating System (ROS) 3.10.x and earlier has a factory account with a password derived from the MAC Address field in the banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) TELNET, (2) remote shell (aka rsh), or (3) serial-console session.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 8.5
Exploit Score: 6.8
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: SINGLE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
EXPLOIT-DB-18779
http://archives.neohapsis.com/archives/bugtraq/2012-04/0186.html
BID-53215
VU#889195
http://arstechnica.com/business/news/2012/04/backdoor-in-mission-critical-hardware-threatens-power-traffic-control-systems.ars
http://ics-cert.us-cert.gov/advisories/ICSA-12-146-01A
http://www.kb.cert.org/vuls/id/MAPG-8RCPEN
http://www.ruggedcom.com/productbulletin/ros-security-page/
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-116-01A.pdf
http://www.wired.com/threatlevel/2012/04/ruggedcom-backdoor/
ruggedcom-operating-system-backdoor(75120)

CWE    1
CWE-310

© SecPod Technologies