var-201404-0628
Vulnerability from variot

The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G, ROS 3.12, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (interface outage) via crafted HTTP packets. RuggedCom Inc. is the world's leading manufacturer of high performance networking and communications equipment for industrial environments. The WEB server listening to port 80 in the RuggedCom Rugged Operating System system fails to properly handle the user-submitted specially crafted messages, allowing the attacker to submit a specially made request to crash the WEB interface. This vulnerability does not affect the HTTPS service and switching functions. RuggedCom Rugged Operating System is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the application resulting in denial-of-service conditions. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany. The following versions are affected: ROS versions prior to 3.11, 3.11 versions prior to ROS 3.11.5 for RS950G products, ROS version 3.12, ROS version 4.0 for RS950G products

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201404-0628",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 1.4,
        "vendor": "siemens",
        "version": "3.12"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.12"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.12.4"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "gt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.11.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.11.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "gt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "4.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "4.1.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.11.5"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "ruggedcom",
        "version": "3.10.1"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "4.0 for rsg2488"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.11"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.11.5 for rs950g"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.6.6"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.5.4"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "4.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.4.9"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.11"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.2.5"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.3.6"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.10.1"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.7.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.3.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.4.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.5.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.7.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.8.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.9.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.10.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "3.12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "ruggedcom rugged operating system",
        "version": "4.0"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      },
      {
        "db": "BID",
        "id": "66522"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-011"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2590"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:siemens:ruggedcom_rugged_operating_system",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001858"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Aivar Liimets of Martem Telecontrol Systems.",
    "sources": [
      {
        "db": "BID",
        "id": "66522"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-2590",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-2590",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-02085",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "1c846bb4-2352-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-70529",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-2590",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-2590",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-02085",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201404-011",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "1c846bb4-2352-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-70529",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70529"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-011"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2590"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G, ROS 3.12, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (interface outage) via crafted HTTP packets. RuggedCom Inc. is the world\u0027s leading manufacturer of high performance networking and communications equipment for industrial environments. The WEB server listening to port 80 in the RuggedCom Rugged Operating System system fails to properly handle the user-submitted specially crafted messages, allowing the attacker to submit a specially made request to crash the WEB interface. This vulnerability does not affect the HTTPS service and switching functions. RuggedCom Rugged Operating System is prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to crash the application resulting in denial-of-service conditions. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany. The following versions are affected: ROS versions prior to 3.11, 3.11 versions prior to ROS 3.11.5 for RS950G products, ROS version 3.12, ROS version 4.0 for RS950G products",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2590"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001858"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      },
      {
        "db": "BID",
        "id": "66522"
      },
      {
        "db": "IVD",
        "id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70529"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-2590",
        "trust": 3.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-087-01",
        "trust": 3.1
      },
      {
        "db": "SIEMENS",
        "id": "SSA-831997",
        "trust": 1.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02085",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-011",
        "trust": 1.0
      },
      {
        "db": "BID",
        "id": "66522",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001858",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "1C846BB4-2352-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "CB580A39-0E4D-4715-96CE-4A91D1D302D2",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-70529",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70529"
      },
      {
        "db": "BID",
        "id": "66522"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-011"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2590"
      }
    ]
  },
  "id": "VAR-201404-0628",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70529"
      }
    ],
    "trust": 1.73979078
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:02:12.685000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SSA-831997",
        "trust": 0.8,
        "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-831997.pdf"
      },
      {
        "title": "RuggedCom Rugged Operating System WEB Interface Denial of Service Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/44605"
      },
      {
        "title": "Siemens RuggedCom ROS Enter the fix for the verification error vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=180265"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-011"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-306",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-20",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-70529"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001858"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2590"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-087-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-831997.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2590"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2590"
      },
      {
        "trust": 0.6,
        "url": "http://www.siemens.com/innovation/en/technology-focus/siemens-cert/cert-security-advisories.htm"
      },
      {
        "trust": 0.3,
        "url": "http://www.ruggedcom.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70529"
      },
      {
        "db": "BID",
        "id": "66522"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-011"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2590"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      },
      {
        "db": "VULHUB",
        "id": "VHN-70529"
      },
      {
        "db": "BID",
        "id": "66522"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-011"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2590"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-04-02T00:00:00",
        "db": "IVD",
        "id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "IVD",
        "id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      },
      {
        "date": "2014-04-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70529"
      },
      {
        "date": "2014-03-28T00:00:00",
        "db": "BID",
        "id": "66522"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001858"
      },
      {
        "date": "2014-04-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201404-011"
      },
      {
        "date": "2014-04-01T06:29:39.423000",
        "db": "NVD",
        "id": "CVE-2014-2590"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-04-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      },
      {
        "date": "2014-04-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-70529"
      },
      {
        "date": "2014-05-29T01:06:00",
        "db": "BID",
        "id": "66522"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001858"
      },
      {
        "date": "2022-02-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201404-011"
      },
      {
        "date": "2024-11-21T02:06:35.403000",
        "db": "NVD",
        "id": "CVE-2014-2590"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-011"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "RuggedCom Rugged Operating System WEB Interface Denial of Service Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "1c846bb4-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "cb580a39-0e4d-4715-96ce-4a91d1d302d2"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-02085"
      }
    ],
    "trust": 1.0
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "access control error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-011"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.