First published: Sun Dec 23 2012(Updated: )
Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS through 2.3.0, and RuggedMax OS through 4.2.1.4621.22 use hardcoded private keys for SSL and SSH communication, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic by leveraging the availability of these keys within ROS files at all customer installations.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens ROS | <=3.11.0 | |
Siemens ROX I OS | <=1.14.5 | |
Siemens ROX II Firmware | <=2.3.0 | |
Siemens RuggedMax OS | <=4.2.1.4621.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4698 has a high severity rating due to the potential for man-in-the-middle attacks.
To mitigate CVE-2012-4698, upgrade to the latest version of the affected operating systems as specified by Siemens.
CVE-2012-4698 affects Siemens RuggedCom ROS versions before 3.12, ROX I OS before 1.14.5, ROX II OS before 2.3.0, and RuggedMax OS before 4.2.1.4621.22.
CVE-2012-4698 can facilitate man-in-the-middle attacks, allowing attackers to spoof servers and decrypt communications.
Yes, the use of hardcoded private keys for SSL and SSH communications is the primary vulnerability in CVE-2012-4698.