The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Ruggedcom ROS: packet transmission between VLAN

Synthesis of the vulnerability 

An attacker can use the IP Forwarding feature of Ruggedcom ROS, in order to send a packet to another VLAN.
Impacted systems: ROS, RuggedSwitch.
Severity of this alert: 2/4.
Creation date: 02/09/2015.
Références of this alert: CVE-2015-6675, SSA-720081, VIGILANCE-VUL-17795.

Description of the vulnerability 

The Ruggedcom ROS switch can be configured with several VLAN, with an IP address in each VLAN.

However, in this case, as IP routing is enabled by default, an attacker can send a packet from one VLAN to another.

An attacker can therefore use the IP Forwarding feature of Ruggedcom ROS, in order to send a packet to another VLAN.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability announce impacts software or systems such as ROS, RuggedSwitch.

Our Vigil@nce team determined that the severity of this cybersecurity threat is medium.

The trust level is of type confirmed by the editor, with an origin of LAN.

An attacker with a expert ability can exploit this computer threat bulletin.

Solutions for this threat 

Ruggedcom ROS: solution for IP Forwarding.
After installing version 4.2.0 (VIGILANCE-SOL-41873), the administrator has to disable IP Forwarding.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a system vulnerability workaround. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.