ID

VAR-201509-0323


CVE

CVE-2015-6675


TITLE

Siemens RUGGEDCOM ROS In VLAN Vulnerabilities bypassing isolation protection mechanisms

Trust: 0.8

sources: JVNDB: JVNDB-2015-004683

DESCRIPTION

Siemens RUGGEDCOM ROS 3.8.0 through 4.1.x permanently enables the IP forwarding feature, which allows remote attackers to bypass a VLAN isolation protection mechanism via IP traffic. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. RuggedCom Inc. is the world's leading manufacturer of high performance networking and communications equipment for industrial environments. Siemens Ruggedcom ROS products are prone to a security bypass vulnerability. An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions; this may aid in launching further attacks. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany

Trust: 2.7

sources: NVD: CVE-2015-6675 // JVNDB: JVNDB-2015-004683 // CNVD: CNVD-2015-05885 // BID: 76546 // IVD: 76a42e28-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-84636

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 76a42e28-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-05885

AFFECTED PRODUCTS

vendor:siemensmodel:ruggedcom rugged operating systemscope:eqversion:4.1.0

Trust: 1.6

vendor:siemensmodel:ruggedcom rugged operating systemscope:eqversion:3.8.0

Trust: 1.6

vendor:siemensmodel:ruggedcom rugged operating systemscope:eqversion:4.0.0

Trust: 1.6

vendor:siemensmodel:ruggedcom rugged operating systemscope:eqversion:3.8.0 to 4.1.x

Trust: 0.8

vendor:siemensmodel:rosscope:eqversion:3.8.0

Trust: 0.6

vendor:siemensmodel:rosscope:eqversion:4.2.0

Trust: 0.6

vendor:siemensmodel:ruggedcom rosscope:eqversion:3.8

Trust: 0.3

vendor:siemensmodel:ruggedcom rosscope:eqversion:4.1.0

Trust: 0.3

vendor:siemensmodel:ruggedcom rosscope:neversion:4.2.0

Trust: 0.3

vendor:ruggedcom rugged operating systemmodel: - scope:eqversion:3.8.0

Trust: 0.2

vendor:ruggedcom rugged operating systemmodel: - scope:eqversion:4.0.0

Trust: 0.2

vendor:ruggedcom rugged operating systemmodel: - scope:eqversion:4.1.0

Trust: 0.2

sources: IVD: 76a42e28-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-05885 // BID: 76546 // JVNDB: JVNDB-2015-004683 // CNNVD: CNNVD-201509-147 // NVD: CVE-2015-6675

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6675
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-6675
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-05885
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201509-147
value: MEDIUM

Trust: 0.6

IVD: 76a42e28-2351-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-84636
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-6675
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-05885
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 76a42e28-2351-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-84636
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 76a42e28-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-05885 // VULHUB: VHN-84636 // JVNDB: JVNDB-2015-004683 // CNNVD: CNNVD-201509-147 // NVD: CVE-2015-6675

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-84636 // JVNDB: JVNDB-2015-004683 // NVD: CVE-2015-6675

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201509-147

TYPE

Design Error

Trust: 0.3

sources: BID: 76546

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004683

PATCH

title:SSA-720081url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-720081.pdf

Trust: 0.8

title:Siemens Rugged Operating System (ROS) default IP forwarding feature VLAN bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/63665

Trust: 0.6

sources: CNVD: CNVD-2015-05885 // JVNDB: JVNDB-2015-004683

EXTERNAL IDS

db:NVDid:CVE-2015-6675

Trust: 3.6

db:ICS CERTid:ICSA-15-244-01

Trust: 2.8

db:SIEMENSid:SSA-720081

Trust: 2.3

db:SECTRACKid:1033478

Trust: 1.1

db:CNNVDid:CNNVD-201509-147

Trust: 0.9

db:CNVDid:CNVD-2015-05885

Trust: 0.8

db:JVNDBid:JVNDB-2015-004683

Trust: 0.8

db:BIDid:76546

Trust: 0.4

db:IVDid:76A42E28-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:SEEBUGid:SSVID-89489

Trust: 0.1

db:VULHUBid:VHN-84636

Trust: 0.1

sources: IVD: 76a42e28-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-05885 // VULHUB: VHN-84636 // BID: 76546 // JVNDB: JVNDB-2015-004683 // CNNVD: CNNVD-201509-147 // NVD: CVE-2015-6675

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-15-244-01

Trust: 2.8

url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-720081.pdf

Trust: 2.3

url:http://www.securitytracker.com/id/1033478

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6675

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6675

Trust: 0.8

url:http://www.siemens.com/

Trust: 0.3

sources: CNVD: CNVD-2015-05885 // VULHUB: VHN-84636 // BID: 76546 // JVNDB: JVNDB-2015-004683 // CNNVD: CNNVD-201509-147 // NVD: CVE-2015-6675

CREDITS

Stephen Craven of the Tennessee Valley Authority

Trust: 0.3

sources: BID: 76546

SOURCES

db:IVDid:76a42e28-2351-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2015-05885
db:VULHUBid:VHN-84636
db:BIDid:76546
db:JVNDBid:JVNDB-2015-004683
db:CNNVDid:CNNVD-201509-147
db:NVDid:CVE-2015-6675

LAST UPDATE DATE

2024-11-23T22:31:06.803000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-05885date:2015-09-09T00:00:00
db:VULHUBid:VHN-84636date:2016-12-22T00:00:00
db:BIDid:76546date:2015-09-01T00:00:00
db:JVNDBid:JVNDB-2015-004683date:2015-09-15T00:00:00
db:CNNVDid:CNNVD-201509-147date:2015-09-14T00:00:00
db:NVDid:CVE-2015-6675date:2024-11-21T02:35:24.987

SOURCES RELEASE DATE

db:IVDid:76a42e28-2351-11e6-abef-000c29c66e3ddate:2015-09-09T00:00:00
db:CNVDid:CNVD-2015-05885date:2015-09-09T00:00:00
db:VULHUBid:VHN-84636date:2015-09-11T00:00:00
db:BIDid:76546date:2015-09-01T00:00:00
db:JVNDBid:JVNDB-2015-004683date:2015-09-15T00:00:00
db:CNNVDid:CNNVD-201509-147date:2015-09-14T00:00:00
db:NVDid:CVE-2015-6675date:2015-09-11T16:59:11.660