VAR-201212-0313
Vulnerability from variot - Updated: 2022-05-17 02:01Rugged Operating System is prone to multiple security vulnerabilities including: 1. A session-hijacking vulnerability 2. An unauthorized-access vulnerability Successfully exploiting these issues may allow an attacker to gain unauthorized access to the affected application, bypass certain security restrictions and perform unauthorized actions. Rugged Operating System versions prior to 3.12.1 are vulnerable.
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201212-0313",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.9.1"
},
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.12.0"
},
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.11.0"
},
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.10.1"
},
{
"model": "rugged operating system",
"scope": "ne",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.12.1"
}
],
"sources": [
{
"db": "BID",
"id": "57125"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported these issues.",
"sources": [
{
"db": "BID",
"id": "57125"
}
],
"trust": 0.3
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rugged Operating System is prone to multiple security vulnerabilities including:\n1. A session-hijacking vulnerability\n2. An unauthorized-access vulnerability\nSuccessfully exploiting these issues may allow an attacker to gain unauthorized access to the affected application, bypass certain security restrictions and perform unauthorized actions.\nRugged Operating System versions prior to 3.12.1 are vulnerable.",
"sources": [
{
"db": "BID",
"id": "57125"
}
],
"trust": 0.3
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "57125",
"trust": 0.9
},
{
"db": "CNNVD",
"id": "CNNVD-201301-119",
"trust": 0.6
}
],
"sources": [
{
"db": "BID",
"id": "57125"
},
{
"db": "CNNVD",
"id": "CNNVD-201301-119"
}
]
},
"id": "VAR-201212-0313",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.72402596
},
"last_update_date": "2022-05-17T02:01:15.407000Z",
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/57125"
},
{
"trust": 0.3,
"url": "http://www.ruggedcom.com/pdfs/soft_history/ros_history/ros-cf52_main_v3-12-1.pdf"
},
{
"trust": 0.3,
"url": "http://www.ruggedcom.com/"
}
],
"sources": [
{
"db": "BID",
"id": "57125"
},
{
"db": "CNNVD",
"id": "CNNVD-201301-119"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "57125"
},
{
"db": "CNNVD",
"id": "CNNVD-201301-119"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-12-20T00:00:00",
"db": "BID",
"id": "57125"
},
{
"date": "2012-12-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201301-119"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-12-20T00:00:00",
"db": "BID",
"id": "57125"
},
{
"date": "2013-01-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201301-119"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201301-119"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rugged Operating System Web UI Multiple Security Vulnerabilities",
"sources": [
{
"db": "BID",
"id": "57125"
},
{
"db": "CNNVD",
"id": "CNNVD-201301-119"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "57125"
}
],
"trust": 0.3
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…