SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Rugged Operating System (ROS) Vendors:   RuggedCom, Siemens
Siemens Rugged Operating System (ROS) Ethernet Frame Padding Bug Lets Remote Users on the Local Network Obtain Potentially Sensitive VLAN Information
SecurityTracker Alert ID:  1033973
SecurityTracker URL:  http://securitytracker.com/id/1033973
CVE Reference:   CVE-2015-7836   (Links to External Site)
Date:  Oct 27 2015
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 4.2.1
Description:   A vulnerability was reported in Siemens Rugged Operating System (ROS). A remote user on the local network can obtain potentially sensitive information on the target system.

The system does not properly pad unused portions of Ethernet frames with null bytes. A remote user on the local network can monitor the frames to view potentially sensitive portions of network traffic of other VLANs.

David Formby and Raheem Beyah of Georgia Tech (via ICS-CERT) reported this vulnerability.

Impact:   A remote user can obtain potentially sensitive portions of network traffic of other VLANs.
Solution:   The vendor has issued a fix (4.2.1).

The vendor's advisory is available at:

http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-921524.pdf

Vendor URL:  www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-921524.pdf (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC