First published: Mon Feb 02 2015(Updated: )
Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allow context-dependent attackers to discover password hashes by reading (1) files or (2) security logs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Ruggedcom Firmware | <=bs4.4.4621.31 | |
Siemens Ruggedcom Win7000 Firmware | ||
Siemens Ruggedcom WIN7200 Firmware | ||
Siemens Ruggedcom Firmware | <=ss4.4.4624.34 | |
Siemens RUGGEDCOM WIN5100 series subscriber unit | ||
Siemens RUGGEDCOM WIN5200 series subscriber unit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1357 is classified as a medium severity vulnerability that could allow attackers to discover password hashes.
To mitigate CVE-2015-1357, update the firmware of affected Siemens Ruggedcom devices to versions SS4.4.4624.35 or BS4.4.4621.32 or later.
CVE-2015-1357 affects WIN51xx and WIN52xx devices with firmware before SS4.4.4624.35, and WIN70xx and WIN72xx devices with firmware before BS4.4.4621.32.
Yes, CVE-2015-1357 can potentially lead to unauthorized access if attackers successfully retrieve password hashes.
Yes, Siemens has released firmware updates for the affected devices to address the vulnerability described in CVE-2015-1357.