8.5
CVSSv2

CVE-2012-1803

Published: 28/04/2012 Updated: 01/02/2022
CVSS v2 Base Score: 8.5 | Impact Score: 10 | Exploitability Score: 6.8
VMScore: 855
Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

RuggedCom Rugged Operating System (ROS) 3.10.x and previous versions has a factory account with a password derived from the MAC Address field in the banner, which makes it easier for remote malicious users to obtain access by performing a calculation on this address value, and then establishing a (1) TELNET, (2) remote shell (aka rsh), or (3) serial-console session.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

siemens ruggedcom rugged operating system

Exploits

Title: Undocumented Backdoor Access to RuggedCom Devices Author: jc Organization: JC CREW Date: April 23, 2012 CVE: CVE-2012-1803 Background: RuggedCom is one of a handful of networking vendors who capitalize on the market for "Industrial Strength" and "Hardened" networking equipment You'll find their gear installed in traffic control systems, ra ...
An undocumented backdoor account exists within all released versions of RuggedCom's Rugged Operating System (ROS®) The username for the account, which cannot be disabled, is "factory" and its password is dynamically generated based on the device's MAC address Multiple attempts have been made in the past 12 months to have this backdoor removed an ...