Search criteria Use full-text search for keyword queries.
Combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by dates instead of relevance.

15 vulnerabilities found for Hirschmann HiOS by Belden

CVE-2018-25236 (GCVE-0-2018-25236)

Vulnerability from nvd – Published: 2026-04-03 22:44 – Updated: 2026-04-03 22:44
VLAI?
Title
Hirschmann HiOS HiSecOS Authentication Bypass via HTTP Management
Summary
Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthenticated remote attackers to gain administrative access by crafting specially formed HTTP requests. Attackers can exploit improper authentication handling to obtain the authentication status and privileges of a previously authenticated user without providing valid credentials.
CWE
  • CWE-287 - Improper Authentication (CWE-287)
Assigner
Impacted products
Vendor Product Version
Belden Hirschmann HiOS Affected: 0 , ≤ 05.07 (custom)
Affected: 0 , ≤ 06.1.04 (custom)
Affected: 0 , ≤ 06.2.00 (custom)
Unaffected: 06.1.05 (custom)
Unaffected: 07.0.00 (semver)
Unaffected: 03.1.00 (semver)
Create a notification for this product.
    Belden Hirschmann HiSecOS EAGLE Affected: 0 , ≤ 03.00.02 (semver)
Unaffected: 03.0.03 (semver)
Create a notification for this product.
Date Public ?
2018-05-25 00:00
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Hirschmann HiOS",
          "vendor": "Belden",
          "versions": [
            {
              "lessThanOrEqual": "05.07",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "06.1.04",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "06.2.00",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "06.1.05",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "07.0.00",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "03.1.00",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Hirschmann HiSecOS EAGLE",
          "vendor": "Belden",
          "versions": [
            {
              "lessThanOrEqual": "03.00.02",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "03.0.03",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2018-05-25T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthenticated remote attackers to gain administrative access by crafting specially formed HTTP requests. Attackers can exploit improper authentication handling to obtain the authentication status and privileges of a previously authenticated user without providing valid credentials."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "Improper Authentication (CWE-287)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-03T22:44:43.486Z",
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://assets.belden.com/m/52ecadbb5f1b0e04/original/Security-Bulletin-Web-Server-Authentication-Bypass-HiOS-HiSecOS-Hirschmann-BSECV-2018-05.pdf"
        },
        {
          "url": "https://www.vulncheck.com/advisories/hirschmann-hios-hisecos-authentication-bypass-via-http-management"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Hirschmann HiOS HiSecOS Authentication Bypass via HTTP Management"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "cveId": "CVE-2018-25236",
    "datePublished": "2026-04-03T22:44:43.486Z",
    "dateReserved": "2026-04-03T17:10:57.779Z",
    "dateUpdated": "2026-04-03T22:44:43.486Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2020-37216 (GCVE-0-2020-37216)

Vulnerability from nvd – Published: 2026-04-03 20:19 – Updated: 2026-04-04 03:23
VLAI?
Title
Hirschmann HiOS EtherNet/IP Stack Denial of Service
Summary
Hirschmann HiOS devices versions prior to 08.1.00 and 07.1.01 contain a denial of service vulnerability in the EtherNet/IP stack where improper handling of packet length fields allows remote attackers to crash or hang the device. Attackers can send specially crafted UDP EtherNet/IP packets with a length value larger than the actual packet size to render the device inoperable.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
Belden Hirschmann HiOS Unaffected: >= 08.1.00 (custom)
Unaffected: >= 07.1.01 (custom)
Affected: 05.00.00 , ≤ 08.0.00 (semver)
Create a notification for this product.
Date Public ?
2020-09-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-37216",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-04T03:22:43.470099Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-04T03:23:19.214Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "Hirschmann HiOS",
          "vendor": "Belden",
          "versions": [
            {
              "status": "unaffected",
              "version": "\u003e= 08.1.00",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "\u003e= 07.1.01",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "08.0.00",
              "status": "affected",
              "version": "05.00.00",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2020-09-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Hirschmann HiOS devices versions prior to 08.1.00 and 07.1.01  contain a denial of service vulnerability in the EtherNet/IP stack where improper handling of packet length fields allows remote attackers to crash or hang the device. Attackers can send specially crafted UDP EtherNet/IP packets with a length value larger than the actual packet size to render the device inoperable."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-03T20:47:47.596Z",
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://assets.belden.com/m/3d3e2cbfa4860258/original/Belden-Security-Bulletin-BSECV-2019-14.pdf"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.vulncheck.com/advisories/hirschmann-hios-ethernet-ip-stack-denial-of-service"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Hirschmann HiOS EtherNet/IP Stack Denial of Service"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "cveId": "CVE-2020-37216",
    "datePublished": "2026-04-03T20:19:25.269Z",
    "dateReserved": "2026-04-03T15:51:05.544Z",
    "dateUpdated": "2026-04-04T03:23:19.214Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2018-25236 (GCVE-0-2018-25236)

Vulnerability from cvelistv5 – Published: 2026-04-03 22:44 – Updated: 2026-04-03 22:44
VLAI?
Title
Hirschmann HiOS HiSecOS Authentication Bypass via HTTP Management
Summary
Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthenticated remote attackers to gain administrative access by crafting specially formed HTTP requests. Attackers can exploit improper authentication handling to obtain the authentication status and privileges of a previously authenticated user without providing valid credentials.
CWE
  • CWE-287 - Improper Authentication (CWE-287)
Assigner
Impacted products
Vendor Product Version
Belden Hirschmann HiOS Affected: 0 , ≤ 05.07 (custom)
Affected: 0 , ≤ 06.1.04 (custom)
Affected: 0 , ≤ 06.2.00 (custom)
Unaffected: 06.1.05 (custom)
Unaffected: 07.0.00 (semver)
Unaffected: 03.1.00 (semver)
Create a notification for this product.
    Belden Hirschmann HiSecOS EAGLE Affected: 0 , ≤ 03.00.02 (semver)
Unaffected: 03.0.03 (semver)
Create a notification for this product.
Date Public ?
2018-05-25 00:00
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Hirschmann HiOS",
          "vendor": "Belden",
          "versions": [
            {
              "lessThanOrEqual": "05.07",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "06.1.04",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "06.2.00",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "06.1.05",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "07.0.00",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "03.1.00",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Hirschmann HiSecOS EAGLE",
          "vendor": "Belden",
          "versions": [
            {
              "lessThanOrEqual": "03.00.02",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "03.0.03",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2018-05-25T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthenticated remote attackers to gain administrative access by crafting specially formed HTTP requests. Attackers can exploit improper authentication handling to obtain the authentication status and privileges of a previously authenticated user without providing valid credentials."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "Improper Authentication (CWE-287)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-03T22:44:43.486Z",
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://assets.belden.com/m/52ecadbb5f1b0e04/original/Security-Bulletin-Web-Server-Authentication-Bypass-HiOS-HiSecOS-Hirschmann-BSECV-2018-05.pdf"
        },
        {
          "url": "https://www.vulncheck.com/advisories/hirschmann-hios-hisecos-authentication-bypass-via-http-management"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Hirschmann HiOS HiSecOS Authentication Bypass via HTTP Management"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "cveId": "CVE-2018-25236",
    "datePublished": "2026-04-03T22:44:43.486Z",
    "dateReserved": "2026-04-03T17:10:57.779Z",
    "dateUpdated": "2026-04-03T22:44:43.486Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2020-37216 (GCVE-0-2020-37216)

Vulnerability from cvelistv5 – Published: 2026-04-03 20:19 – Updated: 2026-04-04 03:23
VLAI?
Title
Hirschmann HiOS EtherNet/IP Stack Denial of Service
Summary
Hirschmann HiOS devices versions prior to 08.1.00 and 07.1.01 contain a denial of service vulnerability in the EtherNet/IP stack where improper handling of packet length fields allows remote attackers to crash or hang the device. Attackers can send specially crafted UDP EtherNet/IP packets with a length value larger than the actual packet size to render the device inoperable.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
Belden Hirschmann HiOS Unaffected: >= 08.1.00 (custom)
Unaffected: >= 07.1.01 (custom)
Affected: 05.00.00 , ≤ 08.0.00 (semver)
Create a notification for this product.
Date Public ?
2020-09-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-37216",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-04T03:22:43.470099Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-04T03:23:19.214Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "Hirschmann HiOS",
          "vendor": "Belden",
          "versions": [
            {
              "status": "unaffected",
              "version": "\u003e= 08.1.00",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "\u003e= 07.1.01",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "08.0.00",
              "status": "affected",
              "version": "05.00.00",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2020-09-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Hirschmann HiOS devices versions prior to 08.1.00 and 07.1.01  contain a denial of service vulnerability in the EtherNet/IP stack where improper handling of packet length fields allows remote attackers to crash or hang the device. Attackers can send specially crafted UDP EtherNet/IP packets with a length value larger than the actual packet size to render the device inoperable."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-03T20:47:47.596Z",
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://assets.belden.com/m/3d3e2cbfa4860258/original/Belden-Security-Bulletin-BSECV-2019-14.pdf"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.vulncheck.com/advisories/hirschmann-hios-ethernet-ip-stack-denial-of-service"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Hirschmann HiOS EtherNet/IP Stack Denial of Service"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "cveId": "CVE-2020-37216",
    "datePublished": "2026-04-03T20:19:25.269Z",
    "dateReserved": "2026-04-03T15:51:05.544Z",
    "dateUpdated": "2026-04-04T03:23:19.214Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

VAR-201908-0713

Vulnerability from variot - Updated: 2024-11-23 21:23

Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the IPv4 component. There is an IPNET security vulnerability: Stack overflow in the parsing of IPv4 packets’ IP options. Wind River VxWorks Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker could exploit the vulnerability to cause a tNet0 task to crash and execute code with an IPv4 packet with an invalid option. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition or execute arbitrary code on a targeted system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the targeted system

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0713",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": "eq",
        "trust": 2.4,
        "vendor": "sonicos",
        "version": "*"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.4"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.0."
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.5.01"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.40.50.00"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.0"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "ruggedcom win7000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.2.04"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.4"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "05.3.06"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.0."
      },
      {
        "model": "ruggedcom win7200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "power meter 9810",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "garrettcom magnum dx940e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "1.0.1_y7"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.59"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.7"
      },
      {
        "model": "vxworks",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9.4.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.12"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.00"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.2"
      },
      {
        "model": "power meter 9410",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.2.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.3.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.1"
      },
      {
        "model": "ruggedcom win7018",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.3"
      },
      {
        "model": "vxworks",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.5"
      },
      {
        "model": "ruggedcom win7025",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.1"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.7"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.0"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.91"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.0.07"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "siprotec 5",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      },
      {
        "model": "sonicos",
        "scope": null,
        "trust": 0.8,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": "vxworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.9"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.8"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "siprotec 5",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "e series santricity os controller",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.7"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007849"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12256"
      }
    ]
  },
  "cve": "CVE-2019-12256",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-12256",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-25699",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-143984",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-12256",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-12256",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-12256",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-12256",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25699",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1499",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-143984",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-12256",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143984"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12256"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007849"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1499"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12256"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the IPv4 component. There is an IPNET security vulnerability: Stack overflow in the parsing of IPv4 packets\u2019 IP options. Wind River VxWorks Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. An attacker could exploit the vulnerability to cause a tNet0 task to crash and execute code with an IPv4 packet with an invalid option. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition or execute arbitrary code on a targeted system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the targeted system",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-12256"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007849"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      },
      {
        "db": "IVD",
        "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143984"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12256"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-12256",
        "trust": 4.2
      },
      {
        "db": "SIEMENS",
        "id": "SSA-352504",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-189842",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-632562",
        "trust": 1.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-211-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1499",
        "trust": 0.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-320-10",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25699",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92598492",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92467308",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007849",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3695.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ASB-2019.0224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3245",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2856",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "9FF393B8-DD26-4D3C-8562-AE9A1BB6075F",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-143984",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12256",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143984"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12256"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007849"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1499"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12256"
      }
    ]
  },
  "id": "VAR-201908-0713",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143984"
      }
    ],
    "trust": 1.4289024700000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:23:49.865000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security\u00a0Notices Siemens Siemens\u00a0Security\u00a0Advisory",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "title": "Patch for Wind River Systems VxWorks Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/172895"
      },
      {
        "title": "Wind River Systems VxWorks Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95614"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/07/29/wind_river_patches_vxworks/"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1f919286ef48798d96223ef4d2143337"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=2dd69ca01b84b80e09672fedb1c26f51"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=99fa839be73f2df819a67c27caa912f8"
      },
      {
        "title": "Fortinet Security Advisories: Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-222"
      },
      {
        "title": "Urgent11-Suricata-LUA-scripts",
        "trust": 0.1,
        "url": "https://github.com/sud0woodo/Urgent11-Suricata-LUA-scripts "
      },
      {
        "title": "urgent11-poc",
        "trust": 0.1,
        "url": "https://github.com/iweizime/urgent11-poc "
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12256"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007849"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1499"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-120",
        "trust": 1.0
      },
      {
        "problemtype": "Buffer error (CWE-119) [NVD evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.1
      },
      {
        "problemtype": "CWE-787",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-143984"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007849"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12256"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.9,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12256"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0009"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "trust": 1.8,
        "url": "https://support.f5.com/csp/article/k41190253"
      },
      {
        "trust": 1.8,
        "url": "https://support2.windriver.com/index.php?page=security-notices"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12256"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01"
      },
      {
        "trust": 1.2,
        "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks"
      },
      {
        "trust": 1.2,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf"
      },
      {
        "trust": 1.2,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "trust": 0.9,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92467308/"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92598492/"
      },
      {
        "trust": 0.6,
        "url": "https://fortiguard.com/psirt/fg-ir-19-222"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/"
      },
      {
        "trust": 0.1,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026amp;on=view\u0026amp;id=cve-2019-12256"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/120.html"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=60680"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/sud0woodo/urgent11-suricata-lua-scripts"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143984"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12256"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007849"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1499"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12256"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143984"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12256"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007849"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1499"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12256"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "IVD",
        "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f"
      },
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143984"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12256"
      },
      {
        "date": "2019-08-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007849"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1499"
      },
      {
        "date": "2019-08-09T18:15:11.227000",
        "db": "NVD",
        "id": "CVE-2019-12256"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-09-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      },
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143984"
      },
      {
        "date": "2022-08-16T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12256"
      },
      {
        "date": "2023-11-21T01:12:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007849"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1499"
      },
      {
        "date": "2024-11-21T04:22:29.823000",
        "db": "NVD",
        "id": "CVE-2019-12256"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1499"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River Systems VxWorks Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25699"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "9ff393b8-dd26-4d3c-8562-ae9a1bb6075f"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1499"
      }
    ],
    "trust": 0.8
  }
}

VAR-201908-0712

Vulnerability from variot - Updated: 2024-11-23 21:07

Wind River VxWorks has a Buffer Overflow in the TCP component (issue 1 of 4). This is a IPNET security vulnerability: TCP Urgent Pointer = 0 that leads to an integer underflow. Wind River VxWorks Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. An attacker could exploit the vulnerability to execute code. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. The following products and versions are affected: Wind River Systems VxWorks Version 6.9, Version 6.8, Version 6.7, Version 6.6. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition or execute arbitrary code on a targeted system. A successful exploit could allow the malicious user to execute arbitrary code or cause a DoS condition on the targeted system

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0712",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": "eq",
        "trust": 2.6,
        "vendor": "sonicos",
        "version": "*"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.4"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.0."
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.5.01"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.40.50.00"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.0"
      },
      {
        "model": "vxworks",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9.4"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "ruggedcom win7000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.2.04"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.4"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "05.3.06"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.0."
      },
      {
        "model": "ruggedcom win7200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "power meter 9810",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "garrettcom magnum dx940e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "1.0.1_y7"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.7"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.12"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.00"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.2"
      },
      {
        "model": "power meter 9410",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.2.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.3.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.1"
      },
      {
        "model": "ruggedcom win7018",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.3"
      },
      {
        "model": "vxworks",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.5"
      },
      {
        "model": "ruggedcom win7025",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.3"
      },
      {
        "model": "siprotec 5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.1"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.7"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.0"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.91"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.0.07"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "siprotec 5",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      },
      {
        "model": "sonicos",
        "scope": null,
        "trust": 0.8,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": "vxworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siprotec 5",
        "version": "*"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.9"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.8"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "e series santricity os controller",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.7"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007841"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12255"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Zhou Yu",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1497"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-12255",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-12255",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-25700",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-143983",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-12255",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-12255",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-12255",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-12255",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25700",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1497",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-143983",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-12255",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143983"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12255"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007841"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1497"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12255"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks has a Buffer Overflow in the TCP component (issue 1 of 4). This is a IPNET security vulnerability: TCP Urgent Pointer = 0 that leads to an integer underflow. Wind River VxWorks Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. An attacker could exploit the vulnerability to execute code. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. The following products and versions are affected: Wind River Systems VxWorks Version 6.9, Version 6.8, Version 6.7, Version 6.6. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition or execute arbitrary code on a targeted system. A successful exploit could allow the malicious user to execute arbitrary code or cause a DoS condition on the targeted system",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-12255"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007841"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      },
      {
        "db": "IVD",
        "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143983"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12255"
      }
    ],
    "trust": 2.52
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=47233",
        "trust": 0.1,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-12255"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-12255",
        "trust": 4.2
      },
      {
        "db": "PACKETSTORM",
        "id": "154022",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-352504",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-189842",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-632562",
        "trust": 1.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-211-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1497",
        "trust": 0.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-320-10",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25700",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92598492",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92467308",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007841",
        "trust": 0.8
      },
      {
        "db": "EXPLOIT-DB",
        "id": "47233",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3695.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2856",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "61D7170C-1DA5-4162-B6EC-A6C8DA8A0466",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-143983",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12255",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143983"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12255"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007841"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1497"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12255"
      }
    ]
  },
  "id": "VAR-201908-0712",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143983"
      }
    ],
    "trust": 1.4289024700000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:07:51.419000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security\u00a0Notices Siemens Siemens\u00a0Security\u00a0Advisory",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "title": "Wind River Systems VxWorks Patch for Digital Error Vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/172897"
      },
      {
        "title": "Wind River Systems VxWorks Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95612"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/07/29/wind_river_patches_vxworks/"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1f919286ef48798d96223ef4d2143337"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=2dd69ca01b84b80e09672fedb1c26f51"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=99fa839be73f2df819a67c27caa912f8"
      },
      {
        "title": "Fortinet Security Advisories: Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-222"
      },
      {
        "title": "Urgent11-Suricata-LUA-scripts",
        "trust": 0.1,
        "url": "https://github.com/sud0woodo/Urgent11-Suricata-LUA-scripts "
      },
      {
        "title": "urgent11-poc",
        "trust": 0.1,
        "url": "https://github.com/iweizime/urgent11-poc "
      },
      {
        "title": "PoC-in-GitHub",
        "trust": 0.1,
        "url": "https://github.com/developer3000S/PoC-in-GitHub "
      },
      {
        "title": "PoC-in-GitHub",
        "trust": 0.1,
        "url": "https://github.com/hectorgie/PoC-in-GitHub "
      },
      {
        "title": "CVE-POC",
        "trust": 0.1,
        "url": "https://github.com/0xT11/CVE-POC "
      },
      {
        "title": "PoC-in-GitHub",
        "trust": 0.1,
        "url": "https://github.com/nomi-sec/PoC-in-GitHub "
      },
      {
        "title": "BleepingComputer",
        "trust": 0.1,
        "url": "https://www.bleepingcomputer.com/news/security/over-100-000-medical-infusion-pumps-vulnerable-to-years-old-critical-bug/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12255"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007841"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1497"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-120",
        "trust": 1.0
      },
      {
        "problemtype": "Buffer error (CWE-119) [NVD evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-143983"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007841"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12255"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://packetstormsecurity.com/files/154022/vxworks-6.8-integer-underflow.html"
      },
      {
        "trust": 2.3,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12255"
      },
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12255"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0009"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "trust": 1.8,
        "url": "https://support.f5.com/csp/article/k41190253"
      },
      {
        "trust": 1.8,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "trust": 1.8,
        "url": "https://support2.windriver.com/index.php?page=security-notices"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01"
      },
      {
        "trust": 1.1,
        "url": "https://support.f5.com/csp/article/k41190253?utm_source=f5support\u0026amp%3butm_medium=rss"
      },
      {
        "trust": 0.9,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92467308/"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92598492/"
      },
      {
        "trust": 0.7,
        "url": "https://www.exploit-db.com/exploits/47233"
      },
      {
        "trust": 0.6,
        "url": "https://support.f5.com/csp/article/k41190253?utm_source=f5support\u0026utm_medium=rss"
      },
      {
        "trust": 0.6,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf"
      },
      {
        "trust": 0.6,
        "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905"
      },
      {
        "trust": 0.1,
        "url": "https://support.f5.com/csp/article/k41190253?utm_source=f5support\u0026amp;amp;utm_medium=rss"
      },
      {
        "trust": 0.1,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026amp;on=view\u0026amp;id=cve-2019-12255"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/120.html"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=60681"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/sud0woodo/urgent11-suricata-lua-scripts"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143983"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12255"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007841"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1497"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12255"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143983"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12255"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007841"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1497"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12255"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "IVD",
        "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466"
      },
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143983"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12255"
      },
      {
        "date": "2019-08-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007841"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1497"
      },
      {
        "date": "2019-08-09T20:15:11.347000",
        "db": "NVD",
        "id": "CVE-2019-12255"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      },
      {
        "date": "2019-10-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143983"
      },
      {
        "date": "2023-11-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12255"
      },
      {
        "date": "2023-11-21T01:10:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007841"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1497"
      },
      {
        "date": "2024-11-21T04:22:29.610000",
        "db": "NVD",
        "id": "CVE-2019-12255"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1497"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River Systems VxWorks Digital Error Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25700"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "61d7170c-1da5-4162-b6ec-a6c8da8a0466"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1497"
      }
    ],
    "trust": 0.8
  }
}

VAR-201908-0701

Vulnerability from variot - Updated: 2024-11-23 20:30

Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the TCP component (issue 2 of 4). This is an IPNET security vulnerability: TCP Urgent Pointer state confusion caused by a malformed TCP AO option. Wind River VxWorks Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. A buffer overflow vulnerability exists in VxWorks 7 and 6.9. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition or execute arbitrary code on a targeted system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the targeted system. A successful exploit could allow the malicious user to execute arbitrary code or cause a DoS condition on the targeted system

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0701",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": "eq",
        "trust": 2.6,
        "vendor": "sonicos",
        "version": "*"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.4"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.0."
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "7.0"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.5.01"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.0"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.40.50.00"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "ruggedcom win7000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.2.04"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.4"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "05.3.06"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.0."
      },
      {
        "model": "ruggedcom win7200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "power meter 9810",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "communications eagle",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "46.6.0"
      },
      {
        "model": "garrettcom magnum dx940e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "1.0.1_y7"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.59"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.7"
      },
      {
        "model": "vxworks",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9.4.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.00"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.0"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.2"
      },
      {
        "model": "power meter 9410",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.2.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "communications eagle",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "46.8.2"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.3.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.1"
      },
      {
        "model": "ruggedcom win7018",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.3"
      },
      {
        "model": "vxworks",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.5"
      },
      {
        "model": "ruggedcom win7025",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.1"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.7"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.0"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.91"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.0.07"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "siprotec 5",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      },
      {
        "model": "sonicos",
        "scope": null,
        "trust": 0.8,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": "vxworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.9"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.8"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "siprotec 5",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "e series santricity os controller",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.7"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "22963aaa-b2c7-42d9-91ee-9128da8fe4c7"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25705"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007839"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12260"
      }
    ]
  },
  "cve": "CVE-2019-12260",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-12260",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-25705",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "22963aaa-b2c7-42d9-91ee-9128da8fe4c7",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-143989",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-12260",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-12260",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-12260",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-12260",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25705",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202104-975",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1496",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "22963aaa-b2c7-42d9-91ee-9128da8fe4c7",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-143989",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-12260",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "22963aaa-b2c7-42d9-91ee-9128da8fe4c7"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25705"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143989"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12260"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1496"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12260"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the TCP component (issue 2 of 4). This is an IPNET security vulnerability: TCP Urgent Pointer state confusion caused by a malformed TCP AO option. Wind River VxWorks Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. A buffer overflow vulnerability exists in VxWorks 7 and 6.9. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition or execute arbitrary code on a targeted system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the targeted system. A successful exploit could allow the malicious user to execute arbitrary code or cause a DoS condition on the targeted system",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-12260"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007839"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25705"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "db": "IVD",
        "id": "22963aaa-b2c7-42d9-91ee-9128da8fe4c7"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143989"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12260"
      }
    ],
    "trust": 3.06
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-12260",
        "trust": 4.2
      },
      {
        "db": "SIEMENS",
        "id": "SSA-352504",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-189842",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-632562",
        "trust": 1.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-211-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1496",
        "trust": 0.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-320-10",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25705",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92598492",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92467308",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007839",
        "trust": 0.8
      },
      {
        "db": "CS-HELP",
        "id": "SB2021041363",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3695.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ASB-2019.0224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3245",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2856",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021072138",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "22963AAA-B2C7-42D9-91EE-9128DA8FE4C7",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-143989",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12260",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "22963aaa-b2c7-42d9-91ee-9128da8fe4c7"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25705"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143989"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12260"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1496"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12260"
      }
    ]
  },
  "id": "VAR-201908-0701",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "22963aaa-b2c7-42d9-91ee-9128da8fe4c7"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25705"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143989"
      }
    ],
    "trust": 1.4289024700000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "22963aaa-b2c7-42d9-91ee-9128da8fe4c7"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25705"
      }
    ]
  },
  "last_update_date": "2024-11-23T20:30:58.984000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security\u00a0Notices Siemens Siemens\u00a0Security\u00a0Advisory",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "title": "Patch for Wind River Systems VxWorks Buffer Overflow Vulnerability (CNVD-2019-25705)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/172943"
      },
      {
        "title": "Wind River Systems VxWorks Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95611"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/07/29/wind_river_patches_vxworks/"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1f919286ef48798d96223ef4d2143337"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=2dd69ca01b84b80e09672fedb1c26f51"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=99fa839be73f2df819a67c27caa912f8"
      },
      {
        "title": "Fortinet Security Advisories: Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-222"
      },
      {
        "title": "Urgent11-Suricata-LUA-scripts",
        "trust": 0.1,
        "url": "https://github.com/sud0woodo/Urgent11-Suricata-LUA-scripts "
      },
      {
        "title": "urgent11-poc",
        "trust": 0.1,
        "url": "https://github.com/iweizime/urgent11-poc "
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25705"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12260"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1496"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-120",
        "trust": 1.0
      },
      {
        "problemtype": "Buffer error (CWE-119) [NVD evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-143989"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007839"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12260"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "trust": 2.4,
        "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
      },
      {
        "trust": 2.3,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12260"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0009"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "trust": 1.8,
        "url": "https://support.f5.com/csp/article/k41190253"
      },
      {
        "trust": 1.8,
        "url": "https://support2.windriver.com/index.php?page=security-notices"
      },
      {
        "trust": 1.8,
        "url": "https://www.oracle.com//security-alerts/cpujul2021.html"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12260"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01"
      },
      {
        "trust": 0.9,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92467308/"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92598492/"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363"
      },
      {
        "trust": 0.6,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf"
      },
      {
        "trust": 0.6,
        "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks"
      },
      {
        "trust": 0.6,
        "url": "https://fortiguard.com/psirt/fg-ir-19-222"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021072138"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905"
      },
      {
        "trust": 0.6,
        "url": "https://www.oracle.com/security-alerts/cpujul2021.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/"
      },
      {
        "trust": 0.1,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026amp;on=view\u0026amp;id=cve-2019-12260"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/120.html"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=60682"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/sud0woodo/urgent11-suricata-lua-scripts"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25705"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143989"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12260"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1496"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12260"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "22963aaa-b2c7-42d9-91ee-9128da8fe4c7"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25705"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143989"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12260"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007839"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1496"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12260"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "IVD",
        "id": "22963aaa-b2c7-42d9-91ee-9128da8fe4c7"
      },
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25705"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143989"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12260"
      },
      {
        "date": "2019-08-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007839"
      },
      {
        "date": "2021-04-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1496"
      },
      {
        "date": "2019-08-09T21:15:11",
        "db": "NVD",
        "id": "CVE-2019-12260"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25705"
      },
      {
        "date": "2020-10-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143989"
      },
      {
        "date": "2022-08-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12260"
      },
      {
        "date": "2023-11-21T01:17:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007839"
      },
      {
        "date": "2021-04-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-975"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1496"
      },
      {
        "date": "2024-11-21T04:22:30.570000",
        "db": "NVD",
        "id": "CVE-2019-12260"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1496"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind\u00a0River\u00a0VxWorks\u00a0 Buffer error vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007839"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "22963aaa-b2c7-42d9-91ee-9128da8fe4c7"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1496"
      }
    ],
    "trust": 0.8
  }
}

VAR-201908-0699

Vulnerability from variot - Updated: 2024-11-23 20:22

Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and vx7 has an array index error in the IGMPv3 client component. There is an IPNET security vulnerability: DoS via NULL dereference in IGMP parsing. Wind River VxWorks for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. A code issue vulnerability exists in Wind River Systems VxWorks. The vulnerability stems from a problem of improper design or implementation during the code development process of a network system or product. There are currently no detailed details of the vulnerability provided. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7, Version 6.6. An attacker could exploit this vulnerability by sending crafted HTTP requests to the targeted system. A successful exploit could cause a NULL pointer dereference condition, which could allow the malicious user to cause a DoS condition on the targeted system

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0699",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": "eq",
        "trust": 2.4,
        "vendor": "sonicos",
        "version": "*"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.4"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.0."
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "7.0"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.5.01"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.0"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "ruggedcom win7000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.2.04"
      },
      {
        "model": "9810 power meter",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.2.1"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.4"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "05.3.06"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.0."
      },
      {
        "model": "ruggedcom win7200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "garrettcom magnum dx940e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "1.0.1_y7"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.59"
      },
      {
        "model": "9410 power meter",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.2.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.7"
      },
      {
        "model": "vxworks",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9.4.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.3"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.0"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.2"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.3.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.1"
      },
      {
        "model": "ruggedcom win7018",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.3"
      },
      {
        "model": "vxworks",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.5"
      },
      {
        "model": "ruggedcom win7025",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.1"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.7"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.0"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.91"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.0.07"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "siprotec 5",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      },
      {
        "model": "sonicos",
        "scope": null,
        "trust": 0.8,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": "vxworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.9"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.8"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.6"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "siprotec 5",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "e series santricity os controller",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.7"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6ec2dbcd-d932-4972-91bf-710eff608403"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007850"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12259"
      }
    ]
  },
  "cve": "CVE-2019-12259",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-12259",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2019-25709",
            "impactScore": 7.8,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "6ec2dbcd-d932-4972-91bf-710eff608403",
            "impactScore": 7.8,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-143987",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-12259",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2019-12259",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-12259",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-12259",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25709",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1492",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "6ec2dbcd-d932-4972-91bf-710eff608403",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-143987",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-12259",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6ec2dbcd-d932-4972-91bf-710eff608403"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143987"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12259"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007850"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1492"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12259"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and vx7 has an array index error in the IGMPv3 client component. There is an IPNET security vulnerability: DoS via NULL dereference in IGMP parsing. Wind River VxWorks for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. A code issue vulnerability exists in Wind River Systems VxWorks. The vulnerability stems from a problem of improper design or implementation during the code development process of a network system or product. There are currently no detailed details of the vulnerability provided. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7, Version 6.6. An attacker could exploit this vulnerability by sending crafted HTTP requests to the targeted system. A successful exploit could cause a NULL pointer dereference condition, which could allow the malicious user to cause a DoS condition on the targeted system",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-12259"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007850"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      },
      {
        "db": "IVD",
        "id": "6ec2dbcd-d932-4972-91bf-710eff608403"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143987"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12259"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-12259",
        "trust": 4.2
      },
      {
        "db": "SIEMENS",
        "id": "SSA-352504",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-189842",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-632562",
        "trust": 1.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-211-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1492",
        "trust": 0.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-320-10",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25709",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92598492",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92467308",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007850",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3695.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ASB-2019.0224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3245",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2856",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "6EC2DBCD-D932-4972-91BF-710EFF608403",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-143987",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12259",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6ec2dbcd-d932-4972-91bf-710eff608403"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143987"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12259"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007850"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1492"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12259"
      }
    ]
  },
  "id": "VAR-201908-0699",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "6ec2dbcd-d932-4972-91bf-710eff608403"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143987"
      }
    ],
    "trust": 1.4289024700000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6ec2dbcd-d932-4972-91bf-710eff608403"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      }
    ]
  },
  "last_update_date": "2024-11-23T20:22:32.960000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security\u00a0Notices Siemens Siemens\u00a0Security\u00a0Advisory",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "title": "Wind River Systems VxWorks Code Issue Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/172957"
      },
      {
        "title": "Wind River Systems VxWorks Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95607"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/07/29/wind_river_patches_vxworks/"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1f919286ef48798d96223ef4d2143337"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=2dd69ca01b84b80e09672fedb1c26f51"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=99fa839be73f2df819a67c27caa912f8"
      },
      {
        "title": "Fortinet Security Advisories: Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-222"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12259"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007850"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1492"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-476",
        "trust": 1.1
      },
      {
        "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-143987"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007850"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12259"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "trust": 2.3,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12259"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0009"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "trust": 1.8,
        "url": "https://support.f5.com/csp/article/k41190253"
      },
      {
        "trust": 1.8,
        "url": "https://support2.windriver.com/index.php?page=security-notices"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12259"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01"
      },
      {
        "trust": 0.9,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92467308/"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92598492/"
      },
      {
        "trust": 0.6,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf"
      },
      {
        "trust": 0.6,
        "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks"
      },
      {
        "trust": 0.6,
        "url": "https://fortiguard.com/psirt/fg-ir-19-222"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/"
      },
      {
        "trust": 0.1,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026amp;on=view\u0026amp;id=cve-2019-12259"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/476.html"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=60686"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143987"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12259"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007850"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1492"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12259"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "6ec2dbcd-d932-4972-91bf-710eff608403"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143987"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12259"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007850"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1492"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12259"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "IVD",
        "id": "6ec2dbcd-d932-4972-91bf-710eff608403"
      },
      {
        "date": "2019-08-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143987"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12259"
      },
      {
        "date": "2019-08-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007850"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1492"
      },
      {
        "date": "2019-08-09T19:15:11.140000",
        "db": "NVD",
        "id": "CVE-2019-12259"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      },
      {
        "date": "2020-09-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143987"
      },
      {
        "date": "2022-06-16T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12259"
      },
      {
        "date": "2023-11-21T01:15:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007850"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1492"
      },
      {
        "date": "2024-11-21T04:22:30.387000",
        "db": "NVD",
        "id": "CVE-2019-12259"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1492"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River Systems VxWorks Code Issue Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "6ec2dbcd-d932-4972-91bf-710eff608403"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25709"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Code problem",
    "sources": [
      {
        "db": "IVD",
        "id": "6ec2dbcd-d932-4972-91bf-710eff608403"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1492"
      }
    ],
    "trust": 0.8
  }
}

VAR-201908-0715

Vulnerability from variot - Updated: 2024-11-23 20:18

Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability: DoS of TCP connection via malformed TCP options. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7, Version 6.6. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on a targeted system. A successful exploit could allow the malicious user to cause a DoS condition on the targeted system

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0715",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": "eq",
        "trust": 2.4,
        "vendor": "sonicos",
        "version": "*"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.4"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.0."
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "7.0"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.5.01"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.0"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.40.50.00"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "ruggedcom win7000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.2.04"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.4"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "05.3.06"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.0."
      },
      {
        "model": "ruggedcom win7200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "power meter 9810",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "garrettcom magnum dx940e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "1.0.1_y7"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.59"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.7"
      },
      {
        "model": "vxworks",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9.4.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.00"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.0"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.2"
      },
      {
        "model": "power meter 9410",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.2.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.3.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.1"
      },
      {
        "model": "ruggedcom win7018",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.3"
      },
      {
        "model": "vxworks",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.5"
      },
      {
        "model": "ruggedcom win7025",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.1"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.7"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.0"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.91"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.0.07"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "siprotec 5",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      },
      {
        "model": "sonicos",
        "scope": null,
        "trust": 0.8,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": "vxworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.9"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.8"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "siprotec 5",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "e series santricity os controller",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.7"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "447d6a09-30fb-4736-bac8-9c0272f13a81"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007842"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12258"
      }
    ]
  },
  "cve": "CVE-2019-12258",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-12258",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.4,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-25703",
            "impactScore": 9.2,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.4,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "447d6a09-30fb-4736-bac8-9c0272f13a81",
            "impactScore": 9.2,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-143986",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-12258",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2019-12258",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-12258",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-12258",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25703",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1495",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "447d6a09-30fb-4736-bac8-9c0272f13a81",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-143986",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-12258",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "447d6a09-30fb-4736-bac8-9c0272f13a81"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143986"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12258"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007842"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1495"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12258"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability: DoS of TCP connection via malformed TCP options. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7, Version 6.6. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on a targeted system. A successful exploit could allow the malicious user to cause a DoS condition on the targeted system",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-12258"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007842"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      },
      {
        "db": "IVD",
        "id": "447d6a09-30fb-4736-bac8-9c0272f13a81"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143986"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12258"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-12258",
        "trust": 4.2
      },
      {
        "db": "SIEMENS",
        "id": "SSA-352504",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-189842",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-632562",
        "trust": 1.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-211-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1495",
        "trust": 0.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-320-10",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25703",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92598492",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92467308",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007842",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3695.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ASB-2019.0224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3245",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2856",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "447D6A09-30FB-4736-BAC8-9C0272F13A81",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-143986",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12258",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "447d6a09-30fb-4736-bac8-9c0272f13a81"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143986"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12258"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007842"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1495"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12258"
      }
    ]
  },
  "id": "VAR-201908-0715",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "447d6a09-30fb-4736-bac8-9c0272f13a81"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143986"
      }
    ],
    "trust": 1.4289024700000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "447d6a09-30fb-4736-bac8-9c0272f13a81"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      }
    ]
  },
  "last_update_date": "2024-11-23T20:18:52.197000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security\u00a0Notices Siemens Siemens\u00a0Security\u00a0Advisory",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "title": "Wind River Systems VxWorks Parameter Denial of Service Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/172949"
      },
      {
        "title": "Wind River Systems VxWorks Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95610"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/07/29/wind_river_patches_vxworks/"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1f919286ef48798d96223ef4d2143337"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=2dd69ca01b84b80e09672fedb1c26f51"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=99fa839be73f2df819a67c27caa912f8"
      },
      {
        "title": "Fortinet Security Advisories: Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-222"
      },
      {
        "title": "urgent11-detector",
        "trust": 0.1,
        "url": "https://github.com/ArmisSecurity/urgent11-detector "
      },
      {
        "title": "Urgent11-Suricata-LUA-scripts",
        "trust": 0.1,
        "url": "https://github.com/sud0woodo/Urgent11-Suricata-LUA-scripts "
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12258"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007842"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1495"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-384",
        "trust": 1.1
      },
      {
        "problemtype": "Session immobilization (CWE-384) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-143986"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007842"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12258"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12258"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0009"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "trust": 1.8,
        "url": "https://support.f5.com/csp/article/k41190253"
      },
      {
        "trust": 1.8,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "trust": 1.8,
        "url": "https://support2.windriver.com/index.php?page=security-notices"
      },
      {
        "trust": 1.7,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12258"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01"
      },
      {
        "trust": 0.9,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92467308/"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92598492/"
      },
      {
        "trust": 0.6,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf"
      },
      {
        "trust": 0.6,
        "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks"
      },
      {
        "trust": 0.6,
        "url": "https://fortiguard.com/psirt/fg-ir-19-222"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/"
      },
      {
        "trust": 0.1,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026amp;on=view\u0026amp;id=cve-2019-12258"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/384.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/armissecurity/urgent11-detector"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=60685"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143986"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12258"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007842"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1495"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12258"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "447d6a09-30fb-4736-bac8-9c0272f13a81"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143986"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12258"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007842"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1495"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12258"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "IVD",
        "id": "447d6a09-30fb-4736-bac8-9c0272f13a81"
      },
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143986"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12258"
      },
      {
        "date": "2019-08-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007842"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1495"
      },
      {
        "date": "2019-08-09T20:15:11.410000",
        "db": "NVD",
        "id": "CVE-2019-12258"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      },
      {
        "date": "2019-09-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143986"
      },
      {
        "date": "2022-08-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12258"
      },
      {
        "date": "2023-11-21T01:13:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007842"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1495"
      },
      {
        "date": "2024-11-21T04:22:30.200000",
        "db": "NVD",
        "id": "CVE-2019-12258"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1495"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River Systems VxWorks Parameter Denial of Service Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "447d6a09-30fb-4736-bac8-9c0272f13a81"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25703"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1495"
      }
    ],
    "trust": 0.6
  }
}

VAR-201908-0702

Vulnerability from variot - Updated: 2024-11-23 20:17

Wind River VxWorks 6.7 though 6.9 and vx7 has a Buffer Overflow in the TCP component (issue 3 of 4). This is an IPNET security vulnerability: TCP Urgent Pointer state confusion during connect() to a remote host. Wind River VxWorks Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. An attacker could exploit the vulnerability to execute code. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition or execute arbitrary code on a targeted system. A successful exploit could cause an Urgent Pointer state confusion, which could allow the malicious user to execute arbitrary code or cause a DoS condition on the targeted system

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0702",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": "eq",
        "trust": 2.6,
        "vendor": "sonicos",
        "version": "*"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.4"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.0."
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "7.0"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.5.01"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.0"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.40.50.00"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "ruggedcom win7000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.2.04"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.4"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "05.3.06"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.0."
      },
      {
        "model": "ruggedcom win7200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "power meter 9810",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "communications eagle",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "46.6.0"
      },
      {
        "model": "garrettcom magnum dx940e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "1.0.1_y7"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.59"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.7"
      },
      {
        "model": "vxworks",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9.4.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.00"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.0"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.2"
      },
      {
        "model": "power meter 9410",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.2.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "communications eagle",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "46.8.2"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.3.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.1"
      },
      {
        "model": "ruggedcom win7018",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.3"
      },
      {
        "model": "vxworks",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.5"
      },
      {
        "model": "ruggedcom win7025",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.1"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.7"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.0"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.91"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.0.07"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "siprotec 5",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      },
      {
        "model": "sonicos",
        "scope": null,
        "trust": 0.8,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": "vxworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.9"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.8"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "siprotec 5",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "e series santricity os controller",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.7"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "522cca90-a84a-490a-9f56-4c706ba3f1f5"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25701"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007840"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12261"
      }
    ]
  },
  "cve": "CVE-2019-12261",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-12261",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-25701",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "522cca90-a84a-490a-9f56-4c706ba3f1f5",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-143990",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-12261",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-12261",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-12261",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-12261",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25701",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1494",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "522cca90-a84a-490a-9f56-4c706ba3f1f5",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-143990",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-12261",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "522cca90-a84a-490a-9f56-4c706ba3f1f5"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25701"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143990"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12261"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007840"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1494"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12261"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks 6.7 though 6.9 and vx7 has a Buffer Overflow in the TCP component (issue 3 of 4). This is an IPNET security vulnerability: TCP Urgent Pointer state confusion during connect() to a remote host. Wind River VxWorks Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. An attacker could exploit the vulnerability to execute code. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition or execute arbitrary code on a targeted system. A successful exploit could cause an Urgent Pointer state confusion, which could allow the malicious user to execute arbitrary code or cause a DoS condition on the targeted system",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-12261"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007840"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25701"
      },
      {
        "db": "IVD",
        "id": "522cca90-a84a-490a-9f56-4c706ba3f1f5"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143990"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12261"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-12261",
        "trust": 4.2
      },
      {
        "db": "SIEMENS",
        "id": "SSA-352504",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-189842",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-632562",
        "trust": 1.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-211-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1494",
        "trust": 0.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-320-10",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25701",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92598492",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92467308",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007840",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3695.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ASB-2019.0224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3245",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2856",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "522CCA90-A84A-490A-9F56-4C706BA3F1F5",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-143990",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12261",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "522cca90-a84a-490a-9f56-4c706ba3f1f5"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25701"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143990"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12261"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007840"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1494"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12261"
      }
    ]
  },
  "id": "VAR-201908-0702",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "522cca90-a84a-490a-9f56-4c706ba3f1f5"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25701"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143990"
      }
    ],
    "trust": 1.4289024700000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "522cca90-a84a-490a-9f56-4c706ba3f1f5"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25701"
      }
    ]
  },
  "last_update_date": "2024-11-23T20:17:16.221000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security\u00a0Notices Siemens Siemens\u00a0Security\u00a0Advisory",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "title": "Patch for Wind River Systems VxWorks Buffer Overflow Vulnerability (CNVD-2019-25701)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/172939"
      },
      {
        "title": "Wind River Systems VxWorks Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95609"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/07/29/wind_river_patches_vxworks/"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1f919286ef48798d96223ef4d2143337"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=2dd69ca01b84b80e09672fedb1c26f51"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=99fa839be73f2df819a67c27caa912f8"
      },
      {
        "title": "Fortinet Security Advisories: Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-222"
      },
      {
        "title": "urgent11-poc",
        "trust": 0.1,
        "url": "https://github.com/iweizime/urgent11-poc "
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25701"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12261"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007840"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1494"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-120",
        "trust": 1.0
      },
      {
        "problemtype": "Buffer error (CWE-119) [NVD evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-143990"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007840"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12261"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0009"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "trust": 1.8,
        "url": "https://support.f5.com/csp/article/k41190253"
      },
      {
        "trust": 1.8,
        "url": "https://support2.windriver.com/index.php?page=security-notices"
      },
      {
        "trust": 1.8,
        "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
      },
      {
        "trust": 1.7,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12261"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12261"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01"
      },
      {
        "trust": 0.9,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92467308/"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92598492/"
      },
      {
        "trust": 0.6,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf"
      },
      {
        "trust": 0.6,
        "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks"
      },
      {
        "trust": 0.6,
        "url": "https://fortiguard.com/psirt/fg-ir-19-222"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/"
      },
      {
        "trust": 0.1,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026amp;on=view\u0026amp;id=cve-2019-12261"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/120.html"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=60683"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/iweizime/urgent11-poc"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25701"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143990"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12261"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007840"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1494"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12261"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "522cca90-a84a-490a-9f56-4c706ba3f1f5"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25701"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143990"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12261"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007840"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1494"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12261"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "IVD",
        "id": "522cca90-a84a-490a-9f56-4c706ba3f1f5"
      },
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25701"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143990"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12261"
      },
      {
        "date": "2019-08-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007840"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1494"
      },
      {
        "date": "2019-08-09T21:15:11.093000",
        "db": "NVD",
        "id": "CVE-2019-12261"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25701"
      },
      {
        "date": "2020-10-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143990"
      },
      {
        "date": "2022-08-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12261"
      },
      {
        "date": "2023-11-21T01:19:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007840"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1494"
      },
      {
        "date": "2024-11-21T04:22:30.777000",
        "db": "NVD",
        "id": "CVE-2019-12261"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1494"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind\u00a0River\u00a0VxWorks\u00a0 Buffer error vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007840"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "522cca90-a84a-490a-9f56-4c706ba3f1f5"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1494"
      }
    ],
    "trust": 0.8
  }
}

VAR-201908-0714

Vulnerability from variot - Updated: 2024-11-23 19:56

Wind River VxWorks 6.6 through 6.9 has a Buffer Overflow in the DHCP client component. There is an IPNET security vulnerability: Heap overflow in DHCP Offer/ACK parsing inside ipdhcpc. Wind River VxWorks Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. An attacker could exploit the vulnerability to overwrite the heap and execute code. The following products and versions are affected: Wind River Systems VxWorks Version 6.9, Version 6.8, Version 6.7, Version 6.6

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0714",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": "eq",
        "trust": 2.4,
        "vendor": "sonicos",
        "version": "*"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.4"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.0."
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.5.01"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.0"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.40.50.00"
      },
      {
        "model": "vxworks",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9.4"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "ruggedcom win7000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.2.04"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.4"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "05.3.06"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.0."
      },
      {
        "model": "ruggedcom win7200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "garrettcom magnum dx940e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "1.0.1_y7"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.59"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.7"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.00"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.0"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.2"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.3.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.1"
      },
      {
        "model": "ruggedcom win7018",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.3"
      },
      {
        "model": "vxworks",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.5"
      },
      {
        "model": "ruggedcom win7025",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.1"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.7"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.0"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.91"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.0.07"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "sonicos",
        "scope": null,
        "trust": 0.8,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "wind river",
        "version": "6.6 to  6.9"
      },
      {
        "model": "siprotec 5",
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.9"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.8"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "siprotec 5",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "e series santricity os controller",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.7"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "93543796-4304-43f2-9d14-11a08f3135cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12257"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:netapp:e-series_santricity_os_controller",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sonicwall:sonicos",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:windriver:vxworks",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:siemens:siprotec_5_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      }
    ]
  },
  "cve": "CVE-2019-12257",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CVE-2019-12257",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2019-25704",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "93543796-4304-43f2-9d14-11a08f3135cc",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "VHN-143985",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-12257",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Adjacent Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-12257",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-12257",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-12257",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25704",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1498",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "93543796-4304-43f2-9d14-11a08f3135cc",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-143985",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "93543796-4304-43f2-9d14-11a08f3135cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25704"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143985"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1498"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12257"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks 6.6 through 6.9 has a Buffer Overflow in the DHCP client component. There is an IPNET security vulnerability: Heap overflow in DHCP Offer/ACK parsing inside ipdhcpc. Wind River VxWorks Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. An attacker could exploit the vulnerability to overwrite the heap and execute code. The following products and versions are affected: Wind River Systems VxWorks Version 6.9, Version 6.8, Version 6.7, Version 6.6",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-12257"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25704"
      },
      {
        "db": "IVD",
        "id": "93543796-4304-43f2-9d14-11a08f3135cc"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143985"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-12257",
        "trust": 3.3
      },
      {
        "db": "SIEMENS",
        "id": "SSA-189842",
        "trust": 1.7
      },
      {
        "db": "SIEMENS",
        "id": "SSA-632562",
        "trust": 1.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-211-01",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1498",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25704",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007725",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3695.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ASB-2019.0224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3245",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2856",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "93543796-4304-43F2-9D14-11A08F3135CC",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-143985",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "93543796-4304-43f2-9d14-11a08f3135cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25704"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143985"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1498"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12257"
      }
    ]
  },
  "id": "VAR-201908-0714",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "93543796-4304-43f2-9d14-11a08f3135cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25704"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143985"
      }
    ],
    "trust": 1.4289024700000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "93543796-4304-43f2-9d14-11a08f3135cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25704"
      }
    ]
  },
  "last_update_date": "2024-11-23T19:56:36.606000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "NTAP-20190802-0001",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "title": "SSA-632562",
        "trust": 0.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
      },
      {
        "title": "SNWLID-2019-0009",
        "trust": 0.8,
        "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009"
      },
      {
        "title": "SECURITY VULNERABILITY RESPONSE INFORMATION",
        "trust": 0.8,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "title": "CVE-2019-12257",
        "trust": 0.8,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12257"
      },
      {
        "title": "Security Notices",
        "trust": 0.8,
        "url": "https://support2.windriver.com/index.php?page=security-notices"
      },
      {
        "title": "Patch for Wind River Systems VxWorks Buffer Overflow Vulnerability (CNVD-2019-25704)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/172945"
      },
      {
        "title": "Wind River Systems VxWorks Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95613"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1498"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-120",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.9
      },
      {
        "problemtype": "CWE-787",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-143985"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12257"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "trust": 2.2,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12257"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
      },
      {
        "trust": 1.7,
        "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0009"
      },
      {
        "trust": 1.7,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "trust": 1.7,
        "url": "https://support.f5.com/csp/article/k41190253"
      },
      {
        "trust": 1.7,
        "url": "https://support2.windriver.com/index.php?page=security-notices"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12257"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-12257"
      },
      {
        "trust": 0.6,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf"
      },
      {
        "trust": 0.6,
        "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks"
      },
      {
        "trust": 0.6,
        "url": "https://fortiguard.com/psirt/fg-ir-19-222"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/"
      },
      {
        "trust": 0.1,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026amp;on=view\u0026amp;id=cve-2019-12257"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25704"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143985"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1498"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12257"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "93543796-4304-43f2-9d14-11a08f3135cc"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25704"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143985"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1498"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12257"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "IVD",
        "id": "93543796-4304-43f2-9d14-11a08f3135cc"
      },
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25704"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143985"
      },
      {
        "date": "2019-08-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1498"
      },
      {
        "date": "2019-08-09T18:15:11.320000",
        "db": "NVD",
        "id": "CVE-2019-12257"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25704"
      },
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143985"
      },
      {
        "date": "2019-10-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1498"
      },
      {
        "date": "2024-11-21T04:22:30.007000",
        "db": "NVD",
        "id": "CVE-2019-12257"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1498"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks Buffer error vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007725"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "93543796-4304-43f2-9d14-11a08f3135cc"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1498"
      }
    ],
    "trust": 0.8
  }
}

VAR-201908-0703

Vulnerability from variot - Updated: 2024-11-23 19:39

Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and 7 has Incorrect Access Control in the RARP client component. IPNET security vulnerability: Handling of unsolicited Reverse ARP replies (Logical Flaw). (DoS) It may be in a state. An attacker could use this vulnerability to send a reverse ARP response to the affected system to assign a unicast IPv4 address to the target. An attacker could exploit this vulnerability by sending RARP packets that submit malicious input to the targeted system. A successful exploit could allow the malicious user to perform unauthorized actions which could be used to affect the availability and integrity of the system.

Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0703",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ruggedcom win7000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "ruggedcom win7025",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.2.04"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.6"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.7"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "7.0"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "05.3.06"
      },
      {
        "model": "ruggedcom win7200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "garrettcom magnum dx940e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "1.0.1_y7"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.8"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.5.01"
      },
      {
        "model": "ruggedcom win7018",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.0.07"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": "6.8"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": "7"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": "6.9"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": "6.6"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.9"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.8"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "7"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "28b6fd21-74b7-4849-aeb5-514937d68966"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25702"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-008557"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12262"
      }
    ]
  },
  "cve": "CVE-2019-12262",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-12262",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2019-25702",
            "impactScore": 7.8,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "28b6fd21-74b7-4849-aeb5-514937d68966",
            "impactScore": 7.8,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-12262",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-12262",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-12262",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-12262",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25702",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1491",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "28b6fd21-74b7-4849-aeb5-514937d68966",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-12262",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "28b6fd21-74b7-4849-aeb5-514937d68966"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25702"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12262"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-008557"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1491"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12262"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and 7 has Incorrect Access Control in the RARP client component. IPNET security vulnerability: Handling of unsolicited Reverse ARP replies (Logical Flaw). (DoS) It may be in a state. An attacker could use this vulnerability to send a reverse ARP response to the affected system to assign a unicast IPv4 address to the target. An attacker could exploit this vulnerability by sending RARP packets that submit malicious input to the targeted system. A successful exploit could allow the malicious user to perform unauthorized actions which could be used to affect the availability and integrity of the system. \n\nProof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-12262"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-008557"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25702"
      },
      {
        "db": "IVD",
        "id": "28b6fd21-74b7-4849-aeb5-514937d68966"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12262"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-12262",
        "trust": 4.1
      },
      {
        "db": "SIEMENS",
        "id": "SSA-189842",
        "trust": 1.7
      },
      {
        "db": "SIEMENS",
        "id": "SSA-352504",
        "trust": 1.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-211-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-320-10",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25702",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1491",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92598492",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92467308",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-008557",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3695.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ASB-2019.0224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3245",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2856",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "28B6FD21-74B7-4849-AEB5-514937D68966",
        "trust": 0.2
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12262",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "28b6fd21-74b7-4849-aeb5-514937d68966"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25702"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12262"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-008557"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1491"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12262"
      }
    ]
  },
  "id": "VAR-201908-0703",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "28b6fd21-74b7-4849-aeb5-514937d68966"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25702"
      }
    ],
    "trust": 1.29719888
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "28b6fd21-74b7-4849-aeb5-514937d68966"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25702"
      }
    ]
  },
  "last_update_date": "2024-11-23T19:39:50.930000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "CVE-2019-12262",
        "trust": 0.8,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12262"
      },
      {
        "title": "Patch for Wind River Systems VxWorks Parameter Injection Vulnerability (CNVD-2019-25702)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/172951"
      },
      {
        "title": "Wind River Systems VxWorks Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95606"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/07/29/wind_river_patches_vxworks/"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1f919286ef48798d96223ef4d2143337"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=2dd69ca01b84b80e09672fedb1c26f51"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=99fa839be73f2df819a67c27caa912f8"
      },
      {
        "title": "Fortinet Security Advisories: Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-222"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25702"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12262"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-008557"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1491"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "Inappropriate access control (CWE-284) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-008557"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12262"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12262"
      },
      {
        "trust": 1.7,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12262"
      },
      {
        "trust": 1.7,
        "url": "https://support.f5.com/csp/article/k41190253"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01"
      },
      {
        "trust": 0.9,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92467308/"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92598492/"
      },
      {
        "trust": 0.6,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf"
      },
      {
        "trust": 0.6,
        "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks"
      },
      {
        "trust": 0.6,
        "url": "https://fortiguard.com/psirt/fg-ir-19-222"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=60687"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25702"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12262"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-008557"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1491"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12262"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "28b6fd21-74b7-4849-aeb5-514937d68966"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25702"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12262"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-008557"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1491"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12262"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "IVD",
        "id": "28b6fd21-74b7-4849-aeb5-514937d68966"
      },
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25702"
      },
      {
        "date": "2019-08-14T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12262"
      },
      {
        "date": "2019-09-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-008557"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1491"
      },
      {
        "date": "2019-08-14T20:15:11.573000",
        "db": "NVD",
        "id": "CVE-2019-12262"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25702"
      },
      {
        "date": "2022-06-16T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12262"
      },
      {
        "date": "2023-11-21T01:21:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-008557"
      },
      {
        "date": "2020-08-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1491"
      },
      {
        "date": "2024-11-21T04:22:30.967000",
        "db": "NVD",
        "id": "CVE-2019-12262"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1491"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind\u00a0River\u00a0VxWorks\u00a0 access control vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-008557"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Access control error",
    "sources": [
      {
        "db": "IVD",
        "id": "28b6fd21-74b7-4849-aeb5-514937d68966"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1491"
      }
    ],
    "trust": 0.8
  }
}

VAR-201908-0706

Vulnerability from variot - Updated: 2024-11-23 19:39

Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report. The vulnerability stems from the process of constructing command parameters from external input data. The network system or product does not properly filter the special characters in the parameters. An attacker could exploit the vulnerability to execute an illegal command. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7, Version 6.6. A vulnerability in the IGMPv3 client component of Wind River VxWorks could allow unauthenticated, remote malicious user to access sensitive information on a targeted system.

Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0706",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": "eq",
        "trust": 2.4,
        "vendor": "sonicos",
        "version": "*"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.4"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.0."
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "7.0"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.5.01"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.0"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.40.50.00"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "ruggedcom win7000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.2.04"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.4"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "05.3.06"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.0."
      },
      {
        "model": "ruggedcom win7200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "power meter 9810",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "garrettcom magnum dx940e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "1.0.1_y7"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.59"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.7"
      },
      {
        "model": "vxworks",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9.4.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.00"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.0"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.2"
      },
      {
        "model": "power meter 9410",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.2.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.3.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.1"
      },
      {
        "model": "ruggedcom win7018",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.3"
      },
      {
        "model": "vxworks",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.5"
      },
      {
        "model": "ruggedcom win7025",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.1"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.7"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.0"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.91"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.0.07"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "siprotec 5",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      },
      {
        "model": "sonicos",
        "scope": null,
        "trust": 0.8,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": "vxworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siprotec 5",
        "version": "*"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.9"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.8"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.9.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.9.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "e series santricity os controller",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.7"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "14a30265-6509-41d2-8c7a-3a278582ea2a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25707"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007852"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12265"
      }
    ]
  },
  "cve": "CVE-2019-12265",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-12265",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2019-25707",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "14a30265-6509-41d2-8c7a-3a278582ea2a",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-143994",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-12265",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2019-12265",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-12265",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-12265",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25707",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1489",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "14a30265-6509-41d2-8c7a-3a278582ea2a",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-143994",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-12265",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "14a30265-6509-41d2-8c7a-3a278582ea2a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25707"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143994"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12265"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007852"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1489"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12265"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report. The vulnerability stems from the process of constructing command parameters from external input data. The network system or product does not properly filter the special characters in the parameters. An attacker could exploit the vulnerability to execute an illegal command. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7, Version 6.6. A vulnerability in the IGMPv3 client component of Wind River VxWorks could allow unauthenticated, remote malicious user to access sensitive information on a targeted system. \n\nProof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-12265"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007852"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25707"
      },
      {
        "db": "IVD",
        "id": "14a30265-6509-41d2-8c7a-3a278582ea2a"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143994"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12265"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-12265",
        "trust": 4.2
      },
      {
        "db": "SIEMENS",
        "id": "SSA-352504",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-189842",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-632562",
        "trust": 1.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-211-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1489",
        "trust": 0.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-320-10",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25707",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92598492",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92467308",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007852",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3695.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ASB-2019.0224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3245",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2856",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "14A30265-6509-41D2-8C7A-3A278582EA2A",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-143994",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12265",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "14a30265-6509-41d2-8c7a-3a278582ea2a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25707"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143994"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12265"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007852"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1489"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12265"
      }
    ]
  },
  "id": "VAR-201908-0706",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "14a30265-6509-41d2-8c7a-3a278582ea2a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25707"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143994"
      }
    ],
    "trust": 1.4289024700000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "14a30265-6509-41d2-8c7a-3a278582ea2a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25707"
      }
    ]
  },
  "last_update_date": "2024-11-23T19:39:29.925000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security\u00a0Notices Siemens Siemens\u00a0Security\u00a0Advisory",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "title": "Patch for Wind River Systems VxWorks Parameter Injection Vulnerability (CNVD-2019-25707)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/172953"
      },
      {
        "title": "Wind River Systems VxWorks Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95604"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/07/29/wind_river_patches_vxworks/"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1f919286ef48798d96223ef4d2143337"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=2dd69ca01b84b80e09672fedb1c26f51"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=99fa839be73f2df819a67c27caa912f8"
      },
      {
        "title": "Fortinet Security Advisories: Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-222"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25707"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12265"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007852"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1489"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-401",
        "trust": 1.1
      },
      {
        "problemtype": "resource management issues (CWE-399) [NVD evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-399",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-143994"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007852"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12265"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12265"
      },
      {
        "trust": 1.8,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0009"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "trust": 1.8,
        "url": "https://support.f5.com/csp/article/k41190253"
      },
      {
        "trust": 1.8,
        "url": "https://support2.windriver.com/index.php?page=security-notices"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12265"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01"
      },
      {
        "trust": 0.9,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92467308/"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92598492/index.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf"
      },
      {
        "trust": 0.6,
        "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks"
      },
      {
        "trust": 0.6,
        "url": "https://fortiguard.com/psirt/fg-ir-19-222"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/"
      },
      {
        "trust": 0.1,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026amp;on=view\u0026amp;id=cve-2019-12265"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/401.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=60689"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25707"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143994"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12265"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007852"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1489"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12265"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "14a30265-6509-41d2-8c7a-3a278582ea2a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25707"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143994"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12265"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007852"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1489"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12265"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "IVD",
        "id": "14a30265-6509-41d2-8c7a-3a278582ea2a"
      },
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25707"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143994"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12265"
      },
      {
        "date": "2019-08-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007852"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1489"
      },
      {
        "date": "2019-08-09T19:15:11.327000",
        "db": "NVD",
        "id": "CVE-2019-12265"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25707"
      },
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143994"
      },
      {
        "date": "2022-08-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12265"
      },
      {
        "date": "2023-11-21T01:26:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007852"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1489"
      },
      {
        "date": "2024-11-21T04:22:31.523000",
        "db": "NVD",
        "id": "CVE-2019-12265"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1489"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind\u00a0River\u00a0VxWorks\u00a0 Vulnerabilities related to resource management in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007852"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Resource management error",
    "sources": [
      {
        "db": "IVD",
        "id": "14a30265-6509-41d2-8c7a-3a278582ea2a"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1489"
      }
    ],
    "trust": 0.8
  }
}

VAR-201908-0704

Vulnerability from variot - Updated: 2024-11-23 19:29

Wind River VxWorks 6.9.4 and vx7 has a Buffer Overflow in the TCP component (issue 4 of 4). There is an IPNET security vulnerability: TCP Urgent Pointer state confusion due to race condition. Wind River VxWorks Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. The vulnerability stems from the improper handling of concurrent access when the network system or product is running and concurrent code needs to access shared resources mutually exclusive. There are currently no detailed details of the vulnerability provided. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7, Version 6.6. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition or execute arbitrary code on a targeted system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the targeted system. A successful exploit could cause an Urgent Pointer state confusion, which could allow the malicious user to execute arbitrary code or cause a DoS condition on the targeted system

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0704",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": "eq",
        "trust": 2.4,
        "vendor": "sonicos",
        "version": "*"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.4"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.0."
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "7.0"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.5.01"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.0"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.40.50.00"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "ruggedcom win7000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.2.04"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.4"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "05.3.06"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.0."
      },
      {
        "model": "ruggedcom win7200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "power meter 9810",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "garrettcom magnum dx940e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "1.0.1_y7"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.59"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.7"
      },
      {
        "model": "vxworks",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9.4.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "8.00"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.1.12"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.0"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.1.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.9.2"
      },
      {
        "model": "power meter 9410",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.2.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.3.1"
      },
      {
        "model": "sonicos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.7.1"
      },
      {
        "model": "ruggedcom win7018",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.0.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.5.3"
      },
      {
        "model": "vxworks",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.5"
      },
      {
        "model": "ruggedcom win7025",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.4.3"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.2.0"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.2.6.1"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "5.9.0.7"
      },
      {
        "model": "sonicos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.3.0"
      },
      {
        "model": "siprotec 5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "7.91"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.0.07"
      },
      {
        "model": "sonicos",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sonicwall",
        "version": "6.5.4.3"
      },
      {
        "model": "e-series santricity os controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "siprotec 5",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      },
      {
        "model": "sonicos",
        "scope": null,
        "trust": 0.8,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": "vxworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.9"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.8"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "siprotec 5",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.9.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "e series santricity os controller",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sonicos",
        "version": "6.2.7.7"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "105f43dd-e73e-463b-843e-0f65bbf82737"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25708"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007851"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12263"
      }
    ]
  },
  "cve": "CVE-2019-12263",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2019-12263",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 4.9,
            "id": "CNVD-2019-25708",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 4.9,
            "id": "105f43dd-e73e-463b-843e-0f65bbf82737",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-143992",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.2,
            "id": "CVE-2019-12263",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.1,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-12263",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-12263",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-12263",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25708",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1493",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "105f43dd-e73e-463b-843e-0f65bbf82737",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-143992",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-12263",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "105f43dd-e73e-463b-843e-0f65bbf82737"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143992"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12263"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007851"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1493"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12263"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks 6.9.4 and vx7 has a Buffer Overflow in the TCP component (issue 4 of 4). There is an IPNET security vulnerability: TCP Urgent Pointer state confusion due to race condition. Wind River VxWorks Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. The vulnerability stems from the improper handling of concurrent access when the network system or product is running and concurrent code needs to access shared resources mutually exclusive. There are currently no detailed details of the vulnerability provided. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7, Version 6.6. A vulnerability in Wind River VxWorks could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition or execute arbitrary code on a targeted system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the targeted system. A successful exploit could cause an Urgent Pointer state confusion, which could allow the malicious user to execute arbitrary code or cause a DoS condition on the targeted system",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-12263"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007851"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25708"
      },
      {
        "db": "IVD",
        "id": "105f43dd-e73e-463b-843e-0f65bbf82737"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143992"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12263"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-12263",
        "trust": 4.2
      },
      {
        "db": "SIEMENS",
        "id": "SSA-352504",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-189842",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-632562",
        "trust": 1.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-211-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1493",
        "trust": 0.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-320-10",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25708",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92598492",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU92467308",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007851",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3695.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ASB-2019.0224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3245",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2856",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "105F43DD-E73E-463B-843E-0F65BBF82737",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-143992",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12263",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "105f43dd-e73e-463b-843e-0f65bbf82737"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143992"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12263"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007851"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1493"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12263"
      }
    ]
  },
  "id": "VAR-201908-0704",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "105f43dd-e73e-463b-843e-0f65bbf82737"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143992"
      }
    ],
    "trust": 1.4289024700000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "105f43dd-e73e-463b-843e-0f65bbf82737"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25708"
      }
    ]
  },
  "last_update_date": "2024-11-23T19:29:10.277000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security\u00a0Notices Siemens Siemens\u00a0Security\u00a0Advisory",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "title": "Patch for Wind River Systems VxWorks Competition Conditional Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/172961"
      },
      {
        "title": "Wind River Systems VxWorks Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95608"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/07/29/wind_river_patches_vxworks/"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1f919286ef48798d96223ef4d2143337"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=2dd69ca01b84b80e09672fedb1c26f51"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=99fa839be73f2df819a67c27caa912f8"
      },
      {
        "title": "Fortinet Security Advisories: Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-222"
      },
      {
        "title": "urgent11-poc",
        "trust": 0.1,
        "url": "https://github.com/iweizime/urgent11-poc "
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25708"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12263"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007851"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1493"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-362",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      },
      {
        "problemtype": "Buffer error (CWE-119) [NVD evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-143992"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007851"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12263"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12263"
      },
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12263"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0009"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
      },
      {
        "trust": 1.8,
        "url": "https://support.f5.com/csp/article/k41190253"
      },
      {
        "trust": 1.8,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "trust": 1.8,
        "url": "https://support2.windriver.com/index.php?page=security-notices"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01"
      },
      {
        "trust": 0.9,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92467308/"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92598492/index.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf"
      },
      {
        "trust": 0.6,
        "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks"
      },
      {
        "trust": 0.6,
        "url": "https://fortiguard.com/psirt/fg-ir-19-222"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/"
      },
      {
        "trust": 0.1,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026amp;on=view\u0026amp;id=cve-2019-12263"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/362.html"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/787.html"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=60684"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/iweizime/urgent11-poc"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143992"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12263"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007851"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1493"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12263"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "105f43dd-e73e-463b-843e-0f65bbf82737"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25708"
      },
      {
        "db": "VULHUB",
        "id": "VHN-143992"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-12263"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007851"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1493"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12263"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "IVD",
        "id": "105f43dd-e73e-463b-843e-0f65bbf82737"
      },
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25708"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143992"
      },
      {
        "date": "2019-08-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12263"
      },
      {
        "date": "2019-08-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007851"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1493"
      },
      {
        "date": "2019-08-09T19:15:11.233000",
        "db": "NVD",
        "id": "CVE-2019-12263"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25708"
      },
      {
        "date": "2019-09-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-143992"
      },
      {
        "date": "2022-08-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-12263"
      },
      {
        "date": "2023-11-21T01:23:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007851"
      },
      {
        "date": "2022-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1493"
      },
      {
        "date": "2024-11-21T04:22:31.140000",
        "db": "NVD",
        "id": "CVE-2019-12263"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1493"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind\u00a0River\u00a0VxWorks\u00a0 Buffer error vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007851"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "105f43dd-e73e-463b-843e-0f65bbf82737"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1493"
      }
    ],
    "trust": 0.8
  }
}

VAR-201908-0705

Vulnerability from variot - Updated: 2024-11-23 19:28

Wind River VxWorks 6.6, 6.7, 6.8, 6.9.3, 6.9.4, and Vx7 has Incorrect Access Control in IPv4 assignment by the ipdhcpc DHCP client component. Wind River VxWorks Exists in a vulnerability in inserting or modifying arguments.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. The vulnerability stems from the process of constructing command parameters from external input data. The network system or product does not properly filter the special characters in the parameters. An attacker could exploit the vulnerability to execute an illegal command

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0705",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ruggedcom win7000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "ruggedcom win7025",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.2.04"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.6"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.7"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "7.0"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "05.3.06"
      },
      {
        "model": "ruggedcom win7200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "garrettcom magnum dx940e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "1.0.1_y7"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.8"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9.4"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.5.01"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "6.9.3"
      },
      {
        "model": "ruggedcom win7018",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "bs5.2.461.17"
      },
      {
        "model": "hirschmann hios",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "belden",
        "version": "07.0.07"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": "6.6"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": "6.9.3"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": "6.7"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": "6.8"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": "6.9.4"
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "vxworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e",
        "version": "7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.9"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.8"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.7"
      },
      {
        "model": "river systems wind river systems vxworks",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wind",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.9.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "6.9.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vxworks",
        "version": "7"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007544"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12264"
      }
    ]
  },
  "cve": "CVE-2019-12264",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "CVE-2019-12264",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2019-25706",
            "impactScore": 7.8,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e",
            "impactScore": 7.8,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-12264",
            "impactScore": 4.2,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Adjacent Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.1,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2019-12264",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-12264",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-12264",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-25706",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201907-1490",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e",
            "trust": 0.2,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007544"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1490"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12264"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River VxWorks 6.6, 6.7, 6.8, 6.9.3, 6.9.4, and Vx7 has Incorrect Access Control in IPv4 assignment by the ipdhcpc DHCP client component. Wind River VxWorks Exists in a vulnerability in inserting or modifying arguments.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Wind River Systems VxWorks is an embedded real-time operating system (RTOS) from Wind River Systems. The vulnerability stems from the process of constructing command parameters from external input data. The network system or product does not properly filter the special characters in the parameters. An attacker could exploit the vulnerability to execute an illegal command",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-12264"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007544"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      },
      {
        "db": "IVD",
        "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-12264",
        "trust": 4.0
      },
      {
        "db": "SIEMENS",
        "id": "SSA-189842",
        "trust": 1.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSMA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-211-01",
        "trust": 1.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-274-01",
        "trust": 1.4
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25706",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1490",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU94736763",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU96242582",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-20-168-01",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007544",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3695.5",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3245",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ASB-2019.0224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2856",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "099DBD8C-FA3C-4762-AAC4-226D6F6B7C0E",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007544"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1490"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12264"
      }
    ]
  },
  "id": "VAR-201908-0705",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      }
    ],
    "trust": 1.29719888
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      }
    ]
  },
  "last_update_date": "2024-11-23T19:28:32.651000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SECURITY\u00a0VULNERABILITY\u00a0RESPONSE\u00a0INFORMATION Wind\u00a0River\u00a0Support",
        "trust": 0.8,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "title": "Wind River Systems VxWorks Parameter Injection Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/172955"
      },
      {
        "title": "Wind River Systems VxWorks Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95605"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007544"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1490"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-88",
        "trust": 1.0
      },
      {
        "problemtype": "Insert or change arguments (CWE-88) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007544"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12264"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
      },
      {
        "trust": 1.6,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
      },
      {
        "trust": 1.6,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03960en_us"
      },
      {
        "trust": 1.6,
        "url": "https://support.f5.com/csp/article/k41190253"
      },
      {
        "trust": 1.6,
        "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12264"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12264"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01"
      },
      {
        "trust": 1.4,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu94736763/"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu96242582/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-168-01"
      },
      {
        "trust": 0.6,
        "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf"
      },
      {
        "trust": 0.6,
        "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks"
      },
      {
        "trust": 0.6,
        "url": "https://fortiguard.com/psirt/fg-ir-19-222"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007544"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1490"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12264"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-007544"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1490"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-12264"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "IVD",
        "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e"
      },
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      },
      {
        "date": "2019-08-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007544"
      },
      {
        "date": "2019-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1490"
      },
      {
        "date": "2019-08-05T18:15:10.863000",
        "db": "NVD",
        "id": "CVE-2019-12264"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      },
      {
        "date": "2024-09-24T06:14:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-007544"
      },
      {
        "date": "2021-09-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201907-1490"
      },
      {
        "date": "2024-11-21T04:22:31.333000",
        "db": "NVD",
        "id": "CVE-2019-12264"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1490"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Wind River Systems VxWorks Parameter injection vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-25706"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1490"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Parameter injection",
    "sources": [
      {
        "db": "IVD",
        "id": "099dbd8c-fa3c-4762-aac4-226d6f6b7c0e"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201907-1490"
      }
    ],
    "trust": 0.8
  }
}