Wind River VxWorks 6.9.4 and vx7 has a Buffer Overflow in the TCP component (issue 4 of 4). There is an IPNET security vulnerability: TCP Urgent Pointer state confusion due to race condition.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
windriver vxworks 7.0 |
||
windriver vxworks |
||
sonicwall sonicos |
||
sonicwall sonicos 6.2.7.1 |
||
sonicwall sonicos 6.2.7.7 |
||
sonicwall sonicos 6.2.7.0 |
||
siemens siprotec_5_firmware |
||
netapp e-series santricity os controller |
||
siemens power_meter_9410_firmware |
||
siemens power_meter_9810_firmware |
||
siemens ruggedcom_win7000_firmware |
||
siemens ruggedcom_win7018_firmware |
||
siemens ruggedcom_win7025_firmware |
||
siemens ruggedcom_win7200_firmware |
||
belden hirschmann_hios |
||
belden garrettcom_magnum_dx940e_firmware |
Equipment in hospitals, factories, offices, etc potentially vulnerable to attack Intel flogs off Wind River after it failed to deliver mobile supremacy NASA rover coders at Intel's Wind River biz axed – sources
Wind River has patched 11 security vulnerabilities in VxWorks that can be potentially exploited over networks or the internet to commandeer all sorts of equipment dotted around the planet. This real-time operating system powers car electronics, factory robots and controllers, aircraft and spacecraft, wireless routers, medical equipment, digital displays, and plenty of other stuff – so if you deploy a vulnerable version of VxWorks, and it is network or internet-connected, you definitely want to...