Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability: DoS of TCP connection via malformed TCP options.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
windriver vxworks 7.0 |
||
windriver vxworks |
||
sonicwall sonicos |
||
sonicwall sonicos 6.2.7.1 |
||
sonicwall sonicos 6.2.7.7 |
||
sonicwall sonicos 6.2.7.0 |
||
siemens siprotec 5 firmware |
||
netapp e-series santricity os controller |
||
siemens power meter 9410 firmware |
||
siemens power meter 9810 firmware |
||
siemens ruggedcom win7000 firmware |
||
siemens ruggedcom win7018 firmware |
||
siemens ruggedcom win7025 firmware |
||
siemens ruggedcom win7200 firmware |
||
belden hirschmann hios |
||
belden garrettcom magnum dx940e firmware |
Equipment in hospitals, factories, offices, etc potentially vulnerable to attack Intel flogs off Wind River after it failed to deliver mobile supremacy NASA rover coders at Intel's Wind River biz axed – sources
Wind River has patched 11 security vulnerabilities in VxWorks that can be potentially exploited over networks or the internet to commandeer all sorts of equipment dotted around the planet. This real-time operating system powers car electronics, factory robots and controllers, aircraft and spacecraft, wireless routers, medical equipment, digital displays, and plenty of other stuff – so if you deploy a vulnerable version of VxWorks, and it is network or internet-connected, you definitely want to...