Vulnerability Details : CVE-2013-6926
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote authenticated users to bypass intended restrictions on administrative actions by leveraging access to a (1) guest or (2) operator account.
Products affected by CVE-2013-6926
- cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-6926
0.21%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 58 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-6926
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.0
|
HIGH | AV:N/AC:L/Au:S/C:P/I:P/A:C |
8.0
|
8.5
|
NIST |
CWE ids for CVE-2013-6926
-
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-6926
-
http://ics-cert.us-cert.gov/advisories/ICSA-13-340-01
RuggedCom ROS Multiple Vulnerabilities | CISAThird Party Advisory;US Government Resource
-
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-324789.pdf
Broken Link;Vendor Advisory
Jump to