Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and vx7 has an array index error in the IGMPv3 client component. There is an IPNET security vulnerability: DoS via NULL dereference in IGMP parsing.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
windriver vxworks 7.0 |
||
windriver vxworks |
||
sonicwall sonicos |
||
sonicwall sonicos 6.2.7.0 |
||
sonicwall sonicos 6.2.7.1 |
||
sonicwall sonicos 6.2.7.7 |
||
siemens siprotec_5_firmware |
||
siemens ruggedcom_win7000_firmware |
||
siemens ruggedcom_win7200_firmware |
||
siemens ruggedcom_win7025_firmware |
||
siemens ruggedcom_win7018_firmware |
||
siemens 9410_power_meter_firmware |
||
siemens 9810_power_meter_firmware |
||
belden hirschmann_hios |
||
belden garrettcom_magnum_dx940e_firmware |
Equipment in hospitals, factories, offices, etc potentially vulnerable to attack Intel flogs off Wind River after it failed to deliver mobile supremacy NASA rover coders at Intel's Wind River biz axed – sources
Wind River has patched 11 security vulnerabilities in VxWorks that can be potentially exploited over networks or the internet to commandeer all sorts of equipment dotted around the planet. This real-time operating system powers car electronics, factory robots and controllers, aircraft and spacecraft, wireless routers, medical equipment, digital displays, and plenty of other stuff – so if you deploy a vulnerable version of VxWorks, and it is network or internet-connected, you definitely want to...