CVE-2012-4698

Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS through 2.3.0, and RuggedMax OS through 4.2.1.4621.22 use hardcoded private keys for SSL and SSH communication, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic by leveraging the availability of these keys within ROS files at all customer installations.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:o:siemens:ros:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:siemens:rox_i_os:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:siemens:rox_ii_os:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:siemens:ruggedmax_os:*:*:*:*:*:*:*:*

Information

Published : 2012-12-23 13:55

Updated : 2013-05-20 20:20


NVD link : CVE-2012-4698

Mitre link : CVE-2012-4698


JSON object : View

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

Advertisement

dedicated server usa

Products Affected

siemens

  • rox_i_os
  • ros
  • rox_ii_os
  • ruggedmax_os