7.5
CVSSv2

CVE-2019-12262

Published: 14/08/2019 Updated: 16/06/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and 7 has Incorrect Access Control in the RARP client component. IPNET security vulnerability: Handling of unsolicited Reverse ARP replies (Logical Flaw).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

windriver vxworks 6.8

windriver vxworks 6.7

windriver vxworks 6.9

windriver vxworks 6.6

windriver vxworks 7.0

belden hirschmann_hios

belden garrettcom_magnum_dx940e_firmware

siemens ruggedcom_win7000_firmware

siemens ruggedcom_win7018_firmware

siemens ruggedcom_win7025_firmware

siemens ruggedcom_win7200_firmware

Recent Articles

Oh sh*t's, 11: VxWorks stars in today's security thriller – hijack bugs discovered in countless gadgets' network code
The Register • Shaun Nichols in San Francisco • 29 Jul 2019

Equipment in hospitals, factories, offices, etc potentially vulnerable to attack Intel flogs off Wind River after it failed to deliver mobile supremacy NASA rover coders at Intel's Wind River biz axed – sources

Wind River has patched 11 security vulnerabilities in VxWorks that can be potentially exploited over networks or the internet to commandeer all sorts of equipment dotted around the planet. This real-time operating system powers car electronics, factory robots and controllers, aircraft and spacecraft, wireless routers, medical equipment, digital displays, and plenty of other stuff – so if you deploy a vulnerable version of VxWorks, and it is network or internet-connected, you definitely want to...