First published: Mon Feb 02 2015(Updated: )
The integrated management service on Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allows remote attackers to bypass authentication and perform administrative actions via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Ruggedcom Firmware | <=bs4.4.4621.31 | |
Siemens Ruggedcom Win7000 Firmware | ||
Siemens Ruggedcom WIN7200 Firmware | ||
Siemens Ruggedcom Firmware | <=ss4.4.4624.34 | |
Siemens RUGGEDCOM WIN5100 series subscriber unit | ||
Siemens RUGGEDCOM WIN5200 series subscriber unit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1448 is considered a critical vulnerability due to its potential for remote exploitation.
To fix CVE-2015-1448, upgrade the firmware on Siemens Ruggedcom WIN51xx, WIN52xx, WIN70xx, and WIN72xx devices to the latest versions beyond SS4.4.4624.35 or BS4.4.4621.32.
CVE-2015-1448 affects Siemens Ruggedcom WIN51xx, WIN52xx, WIN70xx, and WIN72xx devices with specific firmware versions prior to SS4.4.4624.35 and BS4.4.4621.32.
Yes, CVE-2015-1448 allows remote attackers to bypass security measures on affected devices.
The impact of CVE-2015-1448 can potentially include unauthorized access or control over the affected Siemens Ruggedcom devices.