Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and 7 has Incorrect Access Control in the RARP client component. IPNET security vulnerability: Handling of unsolicited Reverse ARP replies (Logical Flaw).
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
windriver vxworks 6.8 |
||
windriver vxworks 6.7 |
||
windriver vxworks 6.9 |
||
windriver vxworks 6.6 |
||
windriver vxworks 7.0 |
||
belden hirschmann_hios |
||
belden garrettcom_magnum_dx940e_firmware |
||
siemens ruggedcom_win7000_firmware |
||
siemens ruggedcom_win7018_firmware |
||
siemens ruggedcom_win7025_firmware |
||
siemens ruggedcom_win7200_firmware |
Equipment in hospitals, factories, offices, etc potentially vulnerable to attack Intel flogs off Wind River after it failed to deliver mobile supremacy NASA rover coders at Intel's Wind River biz axed – sources
Wind River has patched 11 security vulnerabilities in VxWorks that can be potentially exploited over networks or the internet to commandeer all sorts of equipment dotted around the planet. This real-time operating system powers car electronics, factory robots and controllers, aircraft and spacecraft, wireless routers, medical equipment, digital displays, and plenty of other stuff – so if you deploy a vulnerable version of VxWorks, and it is network or internet-connected, you definitely want to...