First published: Fri Mar 28 2014(Updated: )
The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G, ROS 3.12, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (interface outage) via crafted HTTP packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens RuggedCom Rugged operating system | <3.11.0 | |
Siemens RuggedCom Rugged operating system | >=3.12<3.12.4 | |
Siemens RuggedCom Rugged operating system | >3.11.0<3.11.5 | |
Siemens RuggedCom RS950G | ||
Siemens RuggedCom Rugged operating system | >4.0<4.1.0 | |
Siemens RUGGEDCOM ROS RSG2488 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2590 is classified as a denial of service vulnerability that can lead to interface outages.
To mitigate CVE-2014-2590, upgrade the Siemens RuggedCom ROS to version 3.11.5 or later, or version 4.1.0 or above.
CVE-2014-2590 affects Siemens RuggedCom ROS versions prior to 3.11.5 and between 3.12.0 and 3.12.4.
Yes, CVE-2014-2590 can be exploited remotely by sending crafted HTTP packets.
Yes, users should apply updates from Siemens that address this specific vulnerability in affected versions.