Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS through 2.3.0, and RuggedMax OS through 4.2.1.4621.22 use hardcoded private keys for SSL and SSH communication, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic by leveraging the availability of these keys within ROS files at all customer installations.
References
Link | Resource |
---|---|
https://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-622607.pdf | Vendor Advisory |
http://www.ruggedcom.com/productbulletin/ros-security-page/ | Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-354-01.pdf | US Government Resource |
http://ics-cert.us-cert.gov/advisories/ICSA-12-354-01A |
Information
Published : 2012-12-23 13:55
Updated : 2013-05-20 20:20
NVD link : CVE-2012-4698
Mitre link : CVE-2012-4698
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
siemens
- rox_i_os
- ros
- rox_ii_os
- ruggedmax_os