Vulnerability Details : CVE-2012-1803
Public exploit exists!
RuggedCom Rugged Operating System (ROS) 3.10.x and earlier has a factory account with a password derived from the MAC Address field in the banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) TELNET, (2) remote shell (aka rsh), or (3) serial-console session.
Products affected by CVE-2012-1803
- Siemens » Ruggedcom Rugged Operating SystemVersions from including (>=) 3.2.0 and up to, including, (<=) 3.10.1cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-1803
0.72%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2012-1803
-
RuggedCom Telnet Password Generator
First seen: 2020-04-26auxiliary/scanner/telnet/telnet_ruggedcomThis module will calculate the password for the hard-coded hidden username "factory" in the RuggedCom Rugged Operating System (ROS). The password is dynamically generated based on the devices MAC address. Authors: - Borja Merino <bmerinofe@gmail.com> - jc
CVSS scores for CVE-2012-1803
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:M/Au:S/C:C/I:C/A:C |
6.8
|
10.0
|
NIST |
CWE ids for CVE-2012-1803
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-1803
-
http://www.exploit-db.com/exploits/18779
RuggedCom Devices - Backdoor Access - Hardware remote ExploitExploit;Third Party Advisory;VDB Entry
-
http://ics-cert.us-cert.gov/advisories/ICSA-12-146-01A
RuggedCom Weak Cryptography for Password Vulnerability (Update A) | CISAThird Party Advisory;US Government Resource
-
http://www.kb.cert.org/vuls/id/889195
VU#889195 - RuggedCom Rugged Operating System (ROS) contains hard-coded user account with predictable passwordThird Party Advisory;US Government Resource
-
http://www.kb.cert.org/vuls/id/MAPG-8RCPEN
VU#889195 - RuggedCom Rugged Operating System (ROS) contains hard-coded user account with predictable passwordThird Party Advisory;US Government Resource
-
http://seclists.org/fulldisclosure/2012/Apr/277
Full Disclosure: RuggedCom - Backdoor Accounts in my SCADA network? You don't say...Exploit;Mailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/53215
Rugged Operating System Backdoor Unauthorized Access VulnerabilityThird Party Advisory;VDB Entry
-
http://www.ruggedcom.com/productbulletin/ros-security-page/
Broken Link;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75120
RuggedCom Rugged Operating System backdoor CVE-2012-1803 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://archives.neohapsis.com/archives/bugtraq/2012-04/0186.html
Broken Link
-
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-116-01A.pdf
404 - File Not Found | CISABroken Link;Third Party Advisory;US Government Resource
-
http://www.wired.com/threatlevel/2012/04/ruggedcom-backdoor/
Equipment Maker Caught Installing Backdoor Account in Control System Code | WIREDThird Party Advisory
-
http://arstechnica.com/business/news/2012/04/backdoor-in-mission-critical-hardware-threatens-power-traffic-control-systems.ars
Backdoor in mission-critical hardware threatens power, traffic-control systems | Ars TechnicaThird Party Advisory
Jump to