// For flags

CVE-2012-2441

RuggedCom Devices - Backdoor Access

Severity Score

8.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

RuggedCom Rugged Operating System (ROS) before 3.3 has a factory account with a password derived from the MAC Address field in a banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) SSH or (2) HTTPS session, a different vulnerability than CVE-2012-1803.

El Sistema operativo RuggedCom Rugged (ROS) antes de v3.3 tiene una cuenta de fábrica con una contraseña que se deriva del campo de dirección MAC en un banner, lo que hace que sea más fácil obtener acceso a los atacantes remotos mediante la realización de un cálculo de este valor de la dirección MAC, para posteriormente crear un sesión (1) SSH o (2) HTTPS. Se trata de una vulnerabilidad diferente a CVE-2012-1803.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-04-24 First Exploit
  • 2012-04-27 CVE Reserved
  • 2012-04-28 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-10-27 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-521: Weak Password Requirements
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Ruggedcom Rugged Operating System
Search vendor "Siemens" for product "Ruggedcom Rugged Operating System"
< 3.3.0
Search vendor "Siemens" for product "Ruggedcom Rugged Operating System" and version " < 3.3.0"
-
Affected