Vulnerability Description
Siemens RUGGEDCOM ROS 3.8.0 through 4.1.x permanently enables the IP forwarding feature, which allows remote attackers to bypass a VLAN isolation protection mechanism via IP traffic.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Ruggedcom Rugged Operating System | 3.8.0 |
Related Weaknesses (CWE)
References
- http://www.securitytracker.com/id/1033478
- http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-720081.pdfVendor Advisory
- https://ics-cert.us-cert.gov/advisories/ICSA-15-244-01Third Party AdvisoryUS Government Resource
- http://www.securitytracker.com/id/1033478
- http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-720081.pdfVendor Advisory
- https://ics-cert.us-cert.gov/advisories/ICSA-15-244-01Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2015-6675?
CVE-2015-6675 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Siemens RUGGEDCOM ROS 3.8.0 through 4.1.x permanently enables the IP forwarding feature, which allows remote attackers to bypass a VLAN isolation protection mechanism via IP traffic.
How severe is CVE-2015-6675?
CVE-2015-6675 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-6675?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Ruggedcom Rugged Operating System.