Vulnerability Details : CVE-2015-7836
Siemens RUGGEDCOM ROS before 4.2.1 allows remote attackers to obtain sensitive information by sniffing the network for VLAN data within the padding section of an Ethernet frame.
Vulnerability category: Information leak
Products affected by CVE-2015-7836
- cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-7836
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 62 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-7836
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:A/AC:L/Au:N/C:P/I:N/A:N |
6.5
|
2.9
|
NIST |
CWE ids for CVE-2015-7836
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-7836
-
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-921524.pdf
Vendor Advisory
-
https://ics-cert.us-cert.gov/advisories/ICSA-15-300-01
Siemens RuggedCom Improper Ethernet Frame Padding Vulnerability | CISAThird Party Advisory;US Government Resource
-
http://www.securitytracker.com/id/1033973
Siemens Rugged Operating System (ROS) Ethernet Frame Padding Bug Lets Remote Users on the Local Network Obtain Potentially Sensitive VLAN Information - SecurityTracker
Jump to