Categories: US-Cert-Repository

RuggedCom Rugged Operating System Vulnerability

Original release date: April 24, 2012 | Last revised: October 23, 2012

RuggedCom Rugged Operating System (ROS), used in RuggedCom network infrastructure devices, contains a hard-coded user account with a predictable password.

This user account cannot be manually disabled. An attacker who successfully guesses the password may be able to gain complete administrative control of the ROS device.

As a workaround, RuggedCom has recommended disabling the rsh service and setting the number of telnet connections allowed to 0.

For more information, please see US-CERT Vulnerability Note VU#889195.

This product is provided subject to this Notification and this Privacy & Use policy.

admin

Share
Published by
admin

Recent Posts

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

1 day ago

CISA Adds Four Known Exploited Vulnerabilities to Catalog

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on…

2 days ago

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps

The purpose of this Alert is to amplify Poland’s Computer Emergency Response Team (CERT Polska’s)…

3 days ago

MyDoom.B Virus

Systems Affected   Any system running Microsoft Windows (Windows 95 and newer) that are used…

1 month ago

Multiple Vulnerabilities in Microsoft Internet Explorer

Systems Affected   Microsoft Windows systems running Internet Explorer 5.01 Internet Explorer 5.50 Internet Explorer…

1 month ago

This website uses cookies.