Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-12265 (GCVE-0-2019-12265)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:17:39.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support2.windriver.com/index.php?page=security-notices" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K41190253" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-12T12:06:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support2.windriver.com/index.php?page=security-notices" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K41190253" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12265", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support2.windriver.com/index.php?page=security-notices", "refsource": "MISC", "url": "https://support2.windriver.com/index.php?page=security-notices" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009", "refsource": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "name": "https://security.netapp.com/advisory/ntap-20190802-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "name": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "refsource": "CONFIRM", "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "name": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265", "refsource": "CONFIRM", "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265" }, { "name": "https://support.f5.com/csp/article/K41190253", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K41190253" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12265", "datePublished": "2019-08-09T18:14:23", "dateReserved": "2019-05-21T00:00:00", "dateUpdated": "2024-08-04T23:17:39.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-12265\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-08-09T19:15:11.327\",\"lastModified\":\"2024-11-21T04:22:31.523\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report.\"},{\"lang\":\"es\",\"value\":\"Wind River VxWorks versiones 6.5, 6.6, 6.7, 6.8, 6.9.3 y 6.9.4, presenta una P\u00e9rdida de Memoria en el componente cliente IGMPv3. Se presenta una vulnerabilidad de seguridad de IPNET: Un filtrado de informaci\u00f3n de IGMP por medio de un reporte de membres\u00eda espec\u00edfico de IGMPv3.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5\",\"versionEndExcluding\":\"6.9.4.12\",\"matchCriteriaId\":\"D796397A-5CB0-4BF1-A2FD-8943B15751F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:windriver:vxworks:7.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3497F9B-A721-4289-A49F-A19D0F7F0148\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.9.0.0\",\"versionEndIncluding\":\"5.9.0.7\",\"matchCriteriaId\":\"16C417C4-DC9B-48A8-AEAE-755BCC2DA389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.9.1.0.\",\"versionEndIncluding\":\"5.9.1.12\",\"matchCriteriaId\":\"3F047B55-4AAB-438D-BBF2-A0BAD4A5AFB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2.0.0\",\"versionEndIncluding\":\"6.2.3.1\",\"matchCriteriaId\":\"90EA3BDF-084B-4D67-B0EF-4D27CA0EF283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2.4.0\",\"versionEndIncluding\":\"6.2.4.3\",\"matchCriteriaId\":\"D59A1A87-D7B3-4F38-A83E-8CBF0A55A476\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2.5.0\",\"versionEndIncluding\":\"6.2.5.3\",\"matchCriteriaId\":\"C306A1CA-3A13-4085-A481-25A6B2D2412A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2.6.0\",\"versionEndIncluding\":\"6.2.6.1\",\"matchCriteriaId\":\"819517C6-9288-45B1-96B0-90B05AA5F3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2.7.0\",\"versionEndIncluding\":\"6.2.7.4\",\"matchCriteriaId\":\"31148F5D-C86F-463D-9A5B-9D82515EF901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2.9.0\",\"versionEndIncluding\":\"6.2.9.2\",\"matchCriteriaId\":\"24520D09-E8D2-43BE-A4D3-19FE828A4309\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.0.0\",\"versionEndIncluding\":\"6.5.0.3\",\"matchCriteriaId\":\"DF416ABF-027E-4571-A81C-36280BFAA1F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.1.0\",\"versionEndIncluding\":\"6.5.1.4\",\"matchCriteriaId\":\"8C253EDA-69CE-4C3A-9ABF-A7C55CEFA29C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.2.0\",\"versionEndIncluding\":\"6.5.2.3\",\"matchCriteriaId\":\"70C43F8A-0B85-4042-B691-8FDC841A3C2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.3.0\",\"versionEndIncluding\":\"6.5.3.3\",\"matchCriteriaId\":\"1F26B212-EE89-485A-A414-553C0F39DCA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.4.0.\",\"versionEndIncluding\":\"6.5.4.3\",\"matchCriteriaId\":\"E6BA5213-EA5E-423B-9207-E06AED2917B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:6.2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC6DEEC-5FB4-4017-B8F0-99A17AD93A52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:6.2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA6DA86B-D7E7-48E6-B841-206B9501DA67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicos:6.2.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0A2A903-3092-40FB-99FE-B864C52D343E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp300\",\"versionEndExcluding\":\"7.91\",\"matchCriteriaId\":\"00314478-416E-488B-ADBF-DDED873ABE41\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E0F0E17-7BE6-40B8-985B-DF2F5F9D2CA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp200\",\"versionEndExcluding\":\"7.59\",\"matchCriteriaId\":\"E7F2B915-D41F-4D3C-A52D-A63AB729716F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E0F0E17-7BE6-40B8-985B-DF2F5F9D2CA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp300\",\"versionEndExcluding\":\"7.91\",\"matchCriteriaId\":\"00314478-416E-488B-ADBF-DDED873ABE41\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E0F0E17-7BE6-40B8-985B-DF2F5F9D2CA7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.00\",\"versionEndIncluding\":\"8.40.50.00\",\"matchCriteriaId\":\"2E243199-8506-4F65-9C22-2CBD50208F0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:power_meter_9410_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.2.1\",\"matchCriteriaId\":\"E9995922-9A9F-45B0-A982-3BC1D92B76D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:power_meter_9410:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7900C33F-1C31-4A6F-B98C-EF0A8E64F241\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:power_meter_9810_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FCC4AE0-E5A4-4B83-80E3-037FB836A9DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:power_meter_9810:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB5144E0-9082-497E-8958-6B85FDDD6C63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:ruggedcom_win7000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"bs5.2.461.17\",\"matchCriteriaId\":\"47C998D1-9DD5-4470-9241-174170541408\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD6F6C12-9373-48F2-B576-C9AC7A287B53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:ruggedcom_win7018_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"bs5.2.461.17\",\"matchCriteriaId\":\"8216AFC1-213B-4E31-8660-5161E08A7C4E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:ruggedcom_win7018:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0F5DBF-4730-40CE-B9CE-DD4DA31D3ED6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:ruggedcom_win7025_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"bs5.2.461.17\",\"matchCriteriaId\":\"AE5D7B8D-E74F-4839-8839-23894307992D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:ruggedcom_win7025:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63967CFD-D35C-4793-858A-032C44E282F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:ruggedcom_win7200_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"bs5.2.461.17\",\"matchCriteriaId\":\"AD25C864-C272-45B7-8EC5-9120DF6A2072\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7146409-09B7-499C-9544-361B234E952D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.0.07\",\"matchCriteriaId\":\"3950CA89-B400-427C-B6F2-54337AB694E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ees20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D35A90AD-034E-434A-B989-4F871E0AD9A5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_ees25:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3EF7BBA-2BCC-4A16-BBEE-E67CE8F95BE4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_eesx20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76F453AF-21B0-4611-95D7-88AD821632E8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_eesx30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE6A655D-ED55-4344-9F75-5995371C87C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_grs1020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29576107-85D0-4877-875F-7F60EFDB803D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_grs1030:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6200A3-7B4F-4A8E-B9DC-EE6A82093C20\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_grs1042:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEBA19D8-8B2D-4AD0-AA77-A3139C33F44D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_grs1120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B4F7FEA-BB1F-405E-A047-87D0BF0DF054\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_grs1130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641912E2-C368-4438-8D5C-F6615B9FDABC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_grs1142:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F86BB5E8-4499-4E4F-AE5E-1471B297C16F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_msp30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E89FAE18-5B44-4203-ABFD-BC40AF7E51BE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_msp32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D0DFE2E-2356-46D6-B2D9-89FD907CA168\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rail_switch_power_lite:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDE06D94-B686-4468-86CF-AA68BB5CFEF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rail_switch_power_smart:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC6487F7-284A-40C2-B70D-9380AD2A47C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_red25:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79354FA2-4C48-4506-94BE-7B9ECB18015D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsp20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DED918F8-041E-4FFC-AFE8-484828696EDB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsp25:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED7974C-BBE6-4BAE-8962-7B5638C7AE20\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsp30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE16D46-7BA9-43D4-BB4E-1B638CE6C41B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rsp35:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"165B837A-EF09-489F-BD7C-54107F491BC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rspe30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06BF302-8E62-41DB-AA67-6369527B598F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rspe32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56D29DAB-C5D6-4539-86E4-43624FB957A9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rspe35:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"305A9B3E-786C-4F8E-BE36-B4ED84650288\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_rspe37:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CBC8B88-4EC3-4827-B100-3A5A91B29CC2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.5.01\",\"matchCriteriaId\":\"2681FAC3-1E59-497A-9931-F4059F84EF86\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_msp40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E92390DF-BFCC-4F30-88A0-33F63CA9B1B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_octopus_os3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A18D078E-1F1A-4DE5-AE43-840D96BE1C6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07.2.04\",\"matchCriteriaId\":\"98C84F5B-72F6-4059-B634-80EE072D0DF9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_dragon_mach4000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E0562EC-4942-4D14-A634-8A6A5FDB9561\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_dragon_mach4500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79E8B334-8109-4664-8DCC-10876BD702DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"05.3.06\",\"matchCriteriaId\":\"CFB09BFE-D6C9-4433-A53A-F79608BFACA9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_eagle_one:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6D7B3E-90AD-43D9-9192-453A37921E8F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_eagle20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"771189D9-34F0-400D-938B-2AA218C28C43\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:hirschmann_eagle30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DCF228A-F3A8-4B36-A105-04E88980BA76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:belden:garrettcom_magnum_dx940e_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.1_y7\",\"matchCriteriaId\":\"BE3BDD99-1DFA-4037-8E77-902F39842153\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:belden:garrettcom_magnum_dx940e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B635F0-96C1-49DA-957C-2ECD55A316C0\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190802-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K41190253\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support2.windriver.com/index.php?page=security-notices\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190802-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K41190253\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support2.windriver.com/index.php?page=security-notices\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
CERTFR-2019-AVI-371
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Siemens SIPROTEC 5. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SIPROTEC 5 avec CP300 et CP100 versions ant\u00e9rieures \u00e0 V7.91", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPROTEC 5 avec CP200 et CP300 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-12256", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12256" }, { "name": "CVE-2019-12264", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12264" }, { "name": "CVE-2019-12258", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12258" }, { "name": "CVE-2019-12259", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12259" }, { "name": "CVE-2019-12261", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12261" }, { "name": "CVE-2019-10938", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10938" }, { "name": "CVE-2019-12263", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12263" }, { "name": "CVE-2019-12257", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12257" }, { "name": "CVE-2019-12260", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12260" }, { "name": "CVE-2019-12262", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12262" }, { "name": "CVE-2019-12255", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12255" }, { "name": "CVE-2019-12265", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12265" } ], "initial_release_date": "2019-08-05T00:00:00", "last_revision_date": "2019-08-05T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-371", "revisions": [ { "description": "Version initiale", "revision_date": "2019-08-05T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Siemens SIPROTEC 5.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Siemens SIPROTEC 5", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-632562 du 02 ao\u00fbt 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" } ] }
CERTFR-2020-AVI-277
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Siemens Power Meters. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Siemens Power Meters s\u00e9rie 9810", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siemens Power Meters s\u00e9rie 9410 versions ant\u00e9rieures \u00e0 V2.2.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-12256", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12256" }, { "name": "CVE-2019-12258", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12258" }, { "name": "CVE-2019-12259", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12259" }, { "name": "CVE-2019-12261", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12261" }, { "name": "CVE-2019-10938", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10938" }, { "name": "CVE-2019-12263", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12263" }, { "name": "CVE-2019-12260", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12260" }, { "name": "CVE-2019-12262", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12262" }, { "name": "CVE-2019-12255", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12255" }, { "name": "CVE-2019-12265", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12265" } ], "initial_release_date": "2020-05-12T00:00:00", "last_revision_date": "2020-05-12T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-277", "revisions": [ { "description": "Version initiale", "revision_date": "2020-05-12T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Siemens Power\nMeters. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Siemens Power Meters", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-352504 du 12 mai 2020", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" } ] }
CERTFR-2023-AVI-0935
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Siemens | N/A | RUGGEDCOM RSG920P V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XC208G (6GK5208-0GA00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) toutes les versions | ||
Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) toutes les versions | ||
Siemens | N/A | Applications Mendix basées sur Mendix 10 versions antérieures à V10.4.0 | ||
Siemens | N/A | RUGGEDCOM RS416PNC toutes les versions | ||
Siemens | N/A | SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2200NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS8000NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2300PF toutes les versions | ||
Siemens | N/A | SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS416Pv2 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RST2228P versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC208EEC (6GK5208-0BA00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2300P V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS969 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS940GNC toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) toutes les versions | ||
Siemens | N/A | Mendix Studio Pro 8 versions antérieures à V8.18.27 | ||
Siemens | N/A | RUGGEDCOM RS900GNC toutes les versions | ||
Siemens | N/A | RUGGEDCOM M2200F toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2200F toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900LNC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416PNCv2 V5.X toutes les versions | ||
Siemens | N/A | SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | Siemens OPC UA Modelling Editor (SiOME) versions antérieures à V2.8 | ||
Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2488NC V5.X toutes les versions | ||
Siemens | N/A | SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS1600TNC toutes les versions | ||
Siemens | N/A | SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM M2100 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XC208 (6GK5208-0BA00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2288NC V4.X toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) toutes les versions | ||
Siemens | N/A | SCALANCE XP216EEC (6GK5216-0HA00-2ES6) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC216-4C G (6GK5216-4GS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900M-GETS-XX versions antérieures à V4.3.8 | ||
Siemens | N/A | Mendix Studio Pro 10 versions antérieures à V10.3.1 | ||
Siemens | N/A | SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XP208EEC (6GK5208-0HA00-2ES6) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900MNC-GETS-C01 toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900NC(32M) V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM M2200 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XP216 (6GK5216-0HA00-2AS6) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM i801NC toutes les versions | ||
Siemens | N/A | SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RST916C versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM i800 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG2300NC V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS910LNC toutes les versions | ||
Siemens | N/A | Tecnomatix Plant Simulation V2302 versions antérieures à V2302.0004 | ||
Siemens | N/A | RUGGEDCOM RS900GP versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS400 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900M-STND-C01 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS940GF toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416F toutes les versions | ||
Siemens | N/A | SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) toutes les versions | ||
Siemens | N/A | SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2100 (32M) V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG2300 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900 (32M) V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900G versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RMC8388NC V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RMC8388NC V4.X toutes les versions | ||
Siemens | N/A | SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900GF toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2288 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | SINEC PNI versions antérieures à V2.0 | ||
Siemens | N/A | SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2488NC V4.X toutes les versions | ||
Siemens | N/A | Desigo CC product family V7 toutes les versions sans le dernier correctif de sécurité | ||
Siemens | N/A | SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS8000TNC toutes les versions | ||
Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) toutes les versions | ||
Siemens | N/A | SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS400NC toutes les versions | ||
Siemens | N/A | SCALANCE XF204 DNA (6GK5204-0BA00-2YF2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM i803NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS910W versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC216-4C (6GK5216-4BS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC224-4C G (6GK5224-4GS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS416NCv2 V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2100F toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2100PF toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS1600T versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC208G EEC (6GK5208-0GA00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | Desigo CC product family V5.0 toutes les versions sans le dernier correctif de sécurité | ||
Siemens | N/A | SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2300PNC V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2300P V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RMC30 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS920W versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS416PF toutes les versions | ||
Siemens | N/A | RUGGEDCOM i803 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM APE1808 toutes versions utilisées avec Nozomi Guardian / CMC versions V22.6.3 à 23.1.0sans le dernier correctif de sécurité | ||
Siemens | N/A | Applications Mendix basées sur Mendix 7.x versions antérieures à V7.23.37 | ||
Siemens | N/A | RUGGEDCOM RSG908C versions antérieures à V5.6.0 | ||
Siemens | N/A | Applications Mendix basées sur Mendix 9.x versions antérieures à V9.24.10 | ||
Siemens | N/A | RUGGEDCOM RSG920P V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS900W versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XF204-2BA (6GK5204-2AA00-2GF2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS401NC toutes les versions | ||
Siemens | N/A | SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) toutes les versions | ||
Siemens | N/A | SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) toutes les versions | ||
Siemens | N/A | Desigo CC product family V5.1 toutes les versions sans le dernier correctif de sécurité | ||
Siemens | N/A | SCALANCE XC224 (6GK5224-0BA00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900MNC-STND-XX toutes les versions | ||
Siemens | N/A | SIMATIC MV500 family versions antérieures à V3.3.5 | ||
Siemens | N/A | RUGGEDCOM RST916P versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS401 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2488 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS910 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416v2 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG2488F toutes les versions | ||
Siemens | N/A | SCALANCE XC216EEC (6GK5216-0BA00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900GNC(32M) V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RST2228 versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS416P versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG2288NC V5.X toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM M2100F toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS8000 versions antérieures à V4.3.8 | ||
Siemens | N/A | Applications Mendix basées sur Mendix 8.x versions antérieures à V8.18.27 | ||
Siemens | N/A | SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes les versions | ||
Siemens | N/A | SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RP110NC toutes les versions | ||
Siemens | N/A | SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2100P versions antérieures à V4.3.8 | ||
Siemens | N/A | SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM M969F toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900GPF toutes les versions | ||
Siemens | N/A | SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG907R versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM i802 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM M969 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG920PNC V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS920L versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900MNC-STND-XX-C01 toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900F toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900G (32M) V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes les versions | ||
Siemens | N/A | SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) toutes les versions | ||
Siemens | N/A | Simcenter Femap V2301 versions antérieures à V2301.0003 | ||
Siemens | N/A | RUGGEDCOM RSG2100NC(32M) V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2288 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RSG920PNC V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS8000H versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RMC8388 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RSG910C versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG909R versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416PNCv2 V4.X toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS910NC toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) toutes les versions | ||
Siemens | N/A | SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) toutes les versions | ||
Siemens | N/A | SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | Desigo CC product family V6 toutes les versions sans le dernier correctif de sécurité | ||
Siemens | N/A | RUGGEDCOM RS416Pv2 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) toutes les versions | ||
Siemens | N/A | RUGGEDCOM i800NC toutes les versions | ||
Siemens | N/A | SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS930LNC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RMC8388 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | SIMATIC PCS neo versions antérieures à V4.1 | ||
Siemens | N/A | RUGGEDCOM RS900M-STND-XX versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS910L versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) toutes les versions | ||
Siemens | N/A | RUGGEDCOM i802NC toutes les versions | ||
Siemens | N/A | SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS1600FNC toutes les versions | ||
Siemens | N/A | SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2100PNC toutes les versions | ||
Siemens | N/A | SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS400F toutes les versions | ||
Siemens | N/A | Mendix Studio Pro 7 versions antérieures à V7.23.37 | ||
Siemens | N/A | RUGGEDCOM RSG2100 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS8000A versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900L versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS920LNC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS8000T versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) toutes les versions | ||
Siemens | N/A | SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RMC30NC toutes les versions | ||
Siemens | N/A | COMOS versions antérieures à V10.4.4, les vulnérabilités CVE-2023-43505, CVE-2023-46601 ne seront pas corrigées par l'éditeur | ||
Siemens | N/A | RUGGEDCOM RS900GNC(32M) V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2488 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS8000ANC toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE XC216 (6GK5216-0BA00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS930L versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) toutes les versions | ||
Siemens | N/A | SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) toutes les versions | ||
Siemens | N/A | SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSL910NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2300 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RSG2300PNC V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM i801 versions antérieures à V4.3.8 | ||
Siemens | N/A | Mendix Studio Pro 9 versions antérieures à V9.24.0 | ||
Siemens | N/A | RUGGEDCOM M2100NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416NCv2 V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2100NC toutes les versions | ||
Siemens | N/A | SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900M-GETS-C01 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS969NC toutes les versions | ||
Siemens | N/A | SCALANCE XP208 (6GK5208-0HA00-2AS6) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC208G PoE (6GK5208-0RA00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900G (32M) V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | Tecnomatix Plant Simulation V2201 versions antérieures à V2201.0010 | ||
Siemens | N/A | SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS8000HNC toutes les versions | ||
Siemens | N/A | SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | Simcenter Femap V2306 versions antérieures à V2306.0001 | ||
Siemens | N/A | RUGGEDCOM RP110 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900 (32M) V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG2100 (32M) V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM M969NC toutes les versions | ||
Siemens | N/A | SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSL910 versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS1600F versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900NC(32M) V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) toutes les versions | ||
Siemens | N/A | SCALANCE XF204 (6GK5204-0BA00-2GF2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2300NC V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900MNC-GETS-XX toutes les versions | ||
Siemens | N/A | SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS930W versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM M2200NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416v2 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS900GPNC toutes les versions | ||
Siemens | N/A | SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS1600 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS940G versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | SIPROTEC 4 7SJ66 versions antérieures à V4.41 | ||
Siemens | N/A | RUGGEDCOM RSG2300F toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS1600NC toutes les versions | ||
Siemens | N/A | SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2100NC(32M) V5.X toutes les versions | ||
Siemens | N/A | SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416NC toutes les versions | ||
Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2200 versions antérieures à V4.3.8 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "RUGGEDCOM RSG920P V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208G (6GK5208-0GA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Applications Mendix bas\u00e9es sur Mendix 10 versions ant\u00e9rieures \u00e0 V10.4.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416PNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2200NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300PF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416Pv2 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RST2228P versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300P V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS969 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS940GNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix Studio Pro 8 versions ant\u00e9rieures \u00e0 V8.18.27", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2200F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2200F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900LNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416PNCv2 V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siemens OPC UA Modelling Editor (SiOME) versions ant\u00e9rieures \u00e0 V2.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2488NC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600TNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2100 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208 (6GK5208-0BA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2288NC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900M-GETS-XX versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix Studio Pro 10 versions ant\u00e9rieures \u00e0 V10.3.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900MNC-GETS-C01 toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900NC(32M) V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2200 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP216 (6GK5216-0HA00-2AS6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i801NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RST916C versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i800 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300NC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS910LNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Tecnomatix Plant Simulation V2302 versions ant\u00e9rieures \u00e0 V2302.0004", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GP versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS400 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900M-STND-C01 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS940GF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100 (32M) V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900 (32M) V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900G versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC8388NC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC8388NC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2288 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SINEC PNI versions ant\u00e9rieures \u00e0 V2.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2488NC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo CC product family V7 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000TNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS400NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i803NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS910W versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416NCv2 V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100PF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600T versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo CC product family V5.0 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300PNC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300P V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC30 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS920W versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416PF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i803 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM APE1808 toutes versions utilis\u00e9es avec Nozomi Guardian / CMC versions V22.6.3 \u00e0 23.1.0sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Applications Mendix bas\u00e9es sur Mendix 7.x versions ant\u00e9rieures \u00e0 V7.23.37", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG908C versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Applications Mendix bas\u00e9es sur Mendix 9.x versions ant\u00e9rieures \u00e0 V9.24.10", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG920P V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900W versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS401NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo CC product family V5.1 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC224 (6GK5224-0BA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900MNC-STND-XX toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC MV500 family versions ant\u00e9rieures \u00e0 V3.3.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RST916P versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS401 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2488 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS910 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416v2 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2488F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GNC(32M) V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RST2228 versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416P versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2288NC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2100F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Applications Mendix bas\u00e9es sur Mendix 8.x versions ant\u00e9rieures \u00e0 V8.18.27", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RP110NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100P versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M969F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GPF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG907R versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i802 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M969 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG920PNC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS920L versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900MNC-STND-XX-C01 toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900G (32M) V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Simcenter Femap V2301 versions ant\u00e9rieures \u00e0 V2301.0003", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100NC(32M) V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2288 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG920PNC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000H versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC8388 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG910C versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG909R versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416PNCv2 V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS910NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo CC product family V6 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416Pv2 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i800NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS930LNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC8388 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC PCS neo versions ant\u00e9rieures \u00e0 V4.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900M-STND-XX versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS910L versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i802NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600FNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100PNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS400F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix Studio Pro 7 versions ant\u00e9rieures \u00e0 V7.23.37", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000A versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900L versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS920LNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000T versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC30NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "COMOS versions ant\u00e9rieures \u00e0 V10.4.4, les vuln\u00e9rabilit\u00e9s CVE-2023-43505, CVE-2023-46601 ne seront pas corrig\u00e9es par l\u0027\u00e9diteur", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GNC(32M) V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2488 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000ANC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216 (6GK5216-0BA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS930L versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSL910NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300PNC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i801 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix Studio Pro 9 versions ant\u00e9rieures \u00e0 V9.24.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2100NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416NCv2 V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900M-GETS-C01 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS969NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP208 (6GK5208-0HA00-2AS6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900G (32M) V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Tecnomatix Plant Simulation V2201 versions ant\u00e9rieures \u00e0 V2201.0010", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000HNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Simcenter Femap V2306 versions ant\u00e9rieures \u00e0 V2306.0001", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RP110 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900 (32M) V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100 (32M) V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M969NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSL910 versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600F versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900NC(32M) V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XF204 (6GK5204-0BA00-2GF2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300NC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900MNC-GETS-XX toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS930W versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2200NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416v2 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GPNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS940G versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPROTEC 4 7SJ66 versions ant\u00e9rieures \u00e0 V4.41", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100NC(32M) V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2200 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-24895", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24895" }, { "name": "CVE-2023-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216" }, { "name": "CVE-2020-35460", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35460" }, { "name": "CVE-2023-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401" }, { "name": "CVE-2023-33135", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33135" }, { "name": "CVE-2023-1530", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1530" }, { "name": "CVE-2023-22669", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22669" }, { "name": "CVE-2023-44321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44321" }, { "name": "CVE-2023-3935", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3935" }, { "name": "CVE-2023-46096", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46096" }, { "name": "CVE-2023-44317", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44317" }, { "name": "CVE-2022-4304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304" }, { "name": "CVE-2023-38072", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38072" }, { "name": "CVE-2023-24897", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24897" }, { "name": "CVE-2022-44792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2023-38075", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38075" }, { "name": "CVE-2019-12256", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12256" }, { "name": "CVE-2023-35788", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35788" }, { "name": "CVE-2022-28809", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28809" }, { "name": "CVE-2023-24936", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24936" }, { "name": "CVE-2023-38073", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38073" }, { "name": "CVE-2023-46097", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46097" }, { "name": "CVE-2019-12258", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12258" }, { "name": "CVE-2020-25020", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25020" }, { "name": "CVE-2022-4203", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4203" }, { "name": "CVE-2022-44793", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793" }, { "name": "CVE-2023-33128", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33128" }, { "name": "CVE-2019-12259", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12259" }, { "name": "CVE-2023-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217" }, { "name": "CVE-2023-44320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44320" }, { "name": "CVE-2022-39158", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39158" }, { "name": "CVE-2022-28808", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28808" }, { "name": "CVE-2019-12261", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12261" }, { "name": "CVE-2023-46099", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46099" }, { "name": "CVE-2023-46590", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46590" }, { "name": "CVE-2023-2932", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2932" }, { "name": "CVE-2023-41033", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41033" }, { "name": "CVE-2023-46098", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46098" }, { "name": "CVE-2022-37434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434" }, { "name": "CVE-2021-20094", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20094" }, { "name": "CVE-2022-28807", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28807" }, { "name": "CVE-2023-38071", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38071" }, { "name": "CVE-2023-45794", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45794" }, { "name": "CVE-2019-12263", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12263" }, { "name": "CVE-2021-20093", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20093" }, { "name": "CVE-2023-44319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44319" }, { "name": "CVE-2023-46601", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46601" }, { "name": "CVE-2023-32032", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32032" }, { "name": "CVE-2022-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2022-47522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47522" }, { "name": "CVE-2023-38070", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38070" }, { "name": "CVE-2022-23095", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23095" }, { "name": "CVE-2023-44322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44322" }, { "name": "CVE-2023-29245", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29245" }, { "name": "CVE-2023-43503", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43503" }, { "name": "CVE-2019-12260", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12260" }, { "name": "CVE-2022-23218", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23218" }, { "name": "CVE-2023-28260", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28260" }, { "name": "CVE-2023-43505", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43505" }, { "name": "CVE-2023-38074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38074" }, { "name": "CVE-2019-12262", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12262" }, { "name": "CVE-2023-29331", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29331" }, { "name": "CVE-2019-12255", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12255" }, { "name": "CVE-2023-44374", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44374" }, { "name": "CVE-2023-43504", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43504" }, { "name": "CVE-2023-0933", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0933" }, { "name": "CVE-2023-2567", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2567" }, { "name": "CVE-2023-32649", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32649" }, { "name": "CVE-2022-41032", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41032" }, { "name": "CVE-2023-4863", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4863" }, { "name": "CVE-2023-21808", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21808" }, { "name": "CVE-2023-2931", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2931" }, { "name": "CVE-2023-2975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975" }, { "name": "CVE-2022-30184", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30184" }, { "name": "CVE-2019-12265", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12265" }, { "name": "CVE-2023-44373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44373" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2022-23219", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219" }, { "name": "CVE-2023-38076", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38076" }, { "name": "CVE-2023-41032", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41032" }, { "name": "CVE-2023-33126", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33126" }, { "name": "CVE-2023-44318", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44318" }, { "name": "CVE-2023-22670", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22670" } ], "initial_release_date": "2023-11-14T00:00:00", "last_revision_date": "2023-11-14T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0935", "revisions": [ { "description": "Version initiale", "revision_date": "2023-11-14T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un\nd\u00e9ni de service \u00e0 distance et une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-617233 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-292063.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-268517 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-084182.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-197270 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-787941.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-099606 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-625850.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-137900 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-137900.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-456933 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-456933.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-787941 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-457702.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-084182 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-887122.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-887122 du 08 novembre 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-150063.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-150063 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-268517.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-699386 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-197270.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-292063 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-617233.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-625850 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-457702 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-099606.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-478780 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-478780.html" } ] }
CERTFR-2019-AVI-429
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Siemens | N/A | CloudConnect 712 versions antérieures à V1.1.5 | ||
Siemens | N/A | SIMATIC TDC CP51M1 versions antérieures à V1.1.7 | ||
Siemens | N/A | Se référer au bulletins de l'éditeurs pour la liste complète des produits vulnérables, notamment le bulletin de sécurité SSA-187667 concernant les dernières vulnérabilités affectant les Remote Desktop Services de Microsoft (cf. https://www.cert.ssi.gouv.fr/alerte/CERTFR-2019-ALE-012/). | ||
Siemens | N/A | SINEMA Remote Connect Server versions antérieures à V2.0 SP1 | ||
Siemens | N/A | SINETPLAN versions V2.0 sans TIA Administrator V1.0 SP1 Upd1 | ||
Siemens | N/A | SCALANCE SC-600 versions antérieures à V2.0.1 |
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "CloudConnect 712 versions ant\u00e9rieures \u00e0 V1.1.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC TDC CP51M1 versions ant\u00e9rieures \u00e0 V1.1.7", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Se r\u00e9f\u00e9rer au bulletins de l\u0027\u00e9diteurs pour la liste compl\u00e8te des produits vuln\u00e9rables, notamment le bulletin de s\u00e9curit\u00e9 SSA-187667 concernant les derni\u00e8res vuln\u00e9rabilit\u00e9s affectant les Remote Desktop Services de Microsoft (cf. https://www.cert.ssi.gouv.fr/alerte/CERTFR-2019-ALE-012/).", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 V2.0 SP1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SINETPLAN versions V2.0 sans TIA Administrator V1.0 SP1 Upd1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE SC-600 versions ant\u00e9rieures \u00e0 V2.0.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-1182", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1182" }, { "name": "CVE-2019-10937", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10937" }, { "name": "CVE-2019-12256", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12256" }, { "name": "CVE-2019-13920", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13920" }, { "name": "CVE-2019-12264", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12264" }, { "name": "CVE-2019-11478", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11478" }, { "name": "CVE-2019-1222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1222" }, { "name": "CVE-2019-12258", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12258" }, { "name": "CVE-2019-12259", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12259" }, { "name": "CVE-2019-12261", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12261" }, { "name": "CVE-2019-13922", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13922" }, { "name": "CVE-2019-1226", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1226" }, { "name": "CVE-2019-13923", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13923" }, { "name": "CVE-2019-10915", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10915" }, { "name": "CVE-2019-12263", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12263" }, { "name": "CVE-2019-11479", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11479" }, { "name": "CVE-2019-12257", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12257" }, { "name": "CVE-2019-1181", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1181" }, { "name": "CVE-2019-11477", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11477" }, { "name": "CVE-2019-12260", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12260" }, { "name": "CVE-2019-12262", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12262" }, { "name": "CVE-2019-12255", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12255" }, { "name": "CVE-2019-13918", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13918" }, { "name": "CVE-2019-13919", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13919" }, { "name": "CVE-2019-12265", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12265" } ], "initial_release_date": "2019-09-10T00:00:00", "last_revision_date": "2019-09-10T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-429", "revisions": [ { "description": "Version initiale", "revision_date": "2019-09-10T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-250618 du 10 septembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-250618.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-462066 du 10 septembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-189842 du 10 septembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-187667 du 10 septembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-187667.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-884497 du 10 septembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-834884 du 10 septembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-834884.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-191683 du 10 septembre 2019", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-191683.pdf" } ] }
CERTFR-2019-AVI-367
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans la pile réseau IPnet (utilisée notamment par Wind River VxWorks). Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
N/A | N/A | Versions de ThreadX qui utilisent la pile réseau IPnet | ||
N/A | N/A | VxWorks versions 6.5 à 6.9 | ||
N/A | N/A | Versions de VxWorks qui utilisent la pile réseau Interpeak | ||
N/A | N/A | Versions de ZebOS qui utilisent la pile réseau IPnet | ||
N/A | N/A | Versions de INTEGRITY qui utilisent la pile réseau IPnet | ||
N/A | N/A | Versions de OSE (Operating System Embedded) qui utilisent la pile réseau IPnet | ||
N/A | N/A | Versions de Nucleus RTOS qui utilisent la pile réseau IPnet | ||
N/A | N/A | VxWorks version 7 (SR540 et SR610) |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Versions de ThreadX qui utilisent la pile r\u00e9seau IPnet", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "VxWorks versions 6.5 \u00e0 6.9", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Versions de VxWorks qui utilisent la pile r\u00e9seau Interpeak", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Versions de ZebOS qui utilisent la pile r\u00e9seau IPnet", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Versions de INTEGRITY qui utilisent la pile r\u00e9seau IPnet", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Versions de OSE (Operating System Embedded) qui utilisent la pile r\u00e9seau IPnet", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Versions de Nucleus RTOS qui utilisent la pile r\u00e9seau IPnet", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "VxWorks version 7 (SR540 et SR610)", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-12256", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12256" }, { "name": "CVE-2019-12264", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12264" }, { "name": "CVE-2019-12258", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12258" }, { "name": "CVE-2019-12259", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12259" }, { "name": "CVE-2019-12261", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12261" }, { "name": "CVE-2019-12263", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12263" }, { "name": "CVE-2019-12257", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12257" }, { "name": "CVE-2019-12260", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12260" }, { "name": "CVE-2019-12262", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12262" }, { "name": "CVE-2019-12255", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12255" }, { "name": "CVE-2019-12265", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12265" } ], "initial_release_date": "2019-08-01T00:00:00", "last_revision_date": "2019-10-02T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-367", "revisions": [ { "description": "Version initiale", "revision_date": "2019-08-01T00:00:00.000000" }, { "description": "Informations compl\u00e9mentaires sur les syst\u00e8mes impact\u00e9s", "revision_date": "2019-10-02T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans la pile r\u00e9seau\nIPnet (utilis\u00e9e notamment par Wind River VxWorks). Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un\nd\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans la pile TCP/IP IPnet", "vendor_advisories": [ { "published_at": null, "title": "Communiqu\u00e9 de presse Armis du 1 octobre 2019", "url": "https://www.armis.com/resources/iot-security-blog/urgent-11-update/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wind River du 29 juillet 2019", "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wind River du 25 juillet 2019", "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf?v2" } ] }
ghsa-pwq9-w59r-4v6m
Vulnerability from github
Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report.
{ "affected": [], "aliases": [ "CVE-2019-12265" ], "database_specific": { "cwe_ids": [ "CWE-401" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-08-09T19:15:00Z", "severity": "MODERATE" }, "details": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report.", "id": "GHSA-pwq9-w59r-4v6m", "modified": "2022-06-17T00:01:23Z", "published": "2022-05-24T16:53:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12265" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "type": "WEB", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190802-0001" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K41190253" }, { "type": "WEB", "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265" }, { "type": "WEB", "url": "https://support2.windriver.com/index.php?page=security-notices" }, { "type": "WEB", "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ] }
ICSA-19-211-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Wind River", "summary": "reporting these vulnerabilities to CISA with Armis researchers" }, { "names": [ "Gregory Vishnepolsky", "Dor Zusman", "Ben Seri" ], "organization": "Armis", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Information Technology, Healthcare and Public Health, Transportation Systems, Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "United States", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Recommended Practices" }, { "category": "general", "text": "All versions of VxWorks under CURRENT support (6.9.4.11, Vx7 SR540, Vx7 SR610) are affected by one or more of the CVE numbers detailed below.", "title": "Notes on Affected Products" }, { "category": "general", "text": "Older, End-of-Life versions of VxWorks back to 6.5 are also affected by one or more of the CVE numbers below.", "title": "Notes on Affected Products" }, { "category": "general", "text": "All versions of the discontinued product Advanced Networking Technology (ANT) are likely affected by one or more of the CVE numbers below.", "title": "Notes on Affected Products" }, { "category": "general", "text": "The VxWorks bootrom network stack leverages the same IPnet source as VxWorks and, as a result, is also technically vulnerable to CVE-2019-12256. The same patches and mitigations apply to VxWorks and the bootrom network stack. However, the bootrom normally uses statically assigned IP-addresses, not DHCP. If that is true, then the defects related to those protocols do not apply in practice. Also a successful exploit of the bootrom network stack has a more difficult timing component. In typical applications, the bootrom does not listen to TCP-ports, which means that the TCP-related issues must be timed with the target downloading data from the network.", "title": "Notes on Affected Products" }, { "category": "general", "text": "VxWorks 653 MCE 3.x may be affected. Contact Wind River customer support (support@windriver.com) for more details.", "title": "Notes on Affected Products" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-211-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-211-01.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-19-211-01 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-211-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" } ], "title": "Wind River VxWorks (Update A)", "tracking": { "current_release_date": "2019-08-08T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-211-01", "initial_release_date": "2019-07-30T06:00:00.000000Z", "revision_history": [ { "date": "2019-07-30T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2019-08-08T06:00:00.000000Z", "legacy_version": "Update A", "number": "2", "summary": "Update A - Added advisory references for Schneider Electric and Dr\u00e4ger" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "6.9.4.11", "product": { "name": "Wind River VxWorks: 6.9.4.11", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version", "name": "SR540", "product": { "name": "Wind River VxWorks Vx7: SR540", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "VxWorks Vx7" }, { "branches": [ { "category": "product_version", "name": "SR610", "product": { "name": "Wind River VxWorks Vx7: SR610", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "VxWorks Vx7" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=6.5", "product": { "name": "Wind River VxWorks End-of-Life: \u003e=6.5", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "VxWorks End-of-Life" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River Advanced Networking Technology (ANT): vers:all/*", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Advanced Networking Technology (ANT)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River VxWorks bootrom network stack: vers:all/*", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "VxWorks bootrom network stack" }, { "branches": [ { "category": "product_version", "name": "MCE_3.x", "product": { "name": "Wind River VxWorks 653: MCE_3.x", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "VxWorks 653" }, { "branches": [ { "category": "product_version", "name": "SR620", "product": { "name": "Wind River VxWorks 7: SR620", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "VxWorks 7" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=5.3|\u003c=6.4", "product": { "name": "Wind River VxWorks: \u003e=5.3|\u003c=6.4", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River VxWorks Cert: vers:all/*", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "VxWorks Cert" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=2.x", "product": { "name": "Wind River VxWorks 653: \u003c=2.x", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "VxWorks 653" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=MCE_3.x_Cert_Edition", "product": { "name": "Wind River VxWorks 653: \u003e=MCE_3.x_Cert_Edition", "product_id": "CSAFPID-0012" } } ], "category": "product_name", "name": "VxWorks 653" } ], "category": "vendor", "name": "Wind River" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12256", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This vulnerability resides in the IPv4 option parsing and may be triggered by IPv4 packets containing invalid options. The most likely outcome of triggering this defect is that the tNet0 task crashes. This vulnerability can result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12256" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12257", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "DHCP packets may go past the local area network (LAN) via DHCP-relays, but are otherwise confined to the LAN. The DHCP-client may be used by VxWorks and in the bootrom. Bootrom, using DHCP/BOOTP, is only vulnerable during the boot-process. This vulnerability may be used to overwrite the heap, which could result in a later crash when a task requests memory from the heap. This vulnerability can result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12257" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12255", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An attacker can either hijack an existing TCP-session and inject bad TCP-segments or establish a new TCP-session on any TCP-port listened to by the target. This vulnerability could lead to a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow occurs in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12255" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12260", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "This vulnerability could lead to a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12260" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12261", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The impact of this vulnerability is a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12261" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12263", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "This vulnerability relies on a race-condition between the network task (tNet0) and the receiving application. It is very difficult to trigger the race on a system with a single CPU-thread enabled, and there is no way to reliably trigger a race on SMP targets.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12263" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12258", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker with the source and destination TCP-port and IP-addresses of a session can inject invalid TCP-segments into the flow, causing the TCP-session to be reset. An application will see this as an ECONNRESET error message when using the socket after such an attack. The most likely outcome is a crash of the application reading from the affected socket.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12258" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12259", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "This vulnerability requires that at least one IPv4 multicast address has been assigned to the target in an incorrect way (e.g., using the API intended for assigning unicast-addresses). An attacker may use CVE-2019-12264 to incorrectly assign a multicast IP-address. An attacker on the same LAN as the target system may use this vulnerability to cause a NULL-pointer dereference, which most likely will crash the tNet0 task.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12259" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12262", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN can send reverse-ARP responses to the victim system to assign unicast IPv4 addresses to the target.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12262" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12264", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN may choose to hijack a DHCP-client session that requests an IPv4 address. The attacker can send a multicast IP-address in the DHCP offer/ack message, which the victim system then incorrectly assigns. This vulnerability can be combined with CVE-2019-12259 to create a denial-of-service condition.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12264" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12265", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The IGMPv3 reception handler does not expect packets to be spread across multiple IP-fragments.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12265" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] } ] }
icsa-19-274-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Gregory Vishnepolsky", "Dor Zusman", "Ben Seri" ], "organization": "Armis", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Information Technology, Healthcare and Public Health, Transportation Systems, Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Sweden, United States", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Do not click web links or open attachments in unsolicited email messages.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-274-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-274-01.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-19-274-01 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-274-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Interpeak IPnet TCP/IP Stack (Update E)", "tracking": { "current_release_date": "2024-09-24T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-274-01", "initial_release_date": "2019-10-01T06:00:00.000000Z", "revision_history": [ { "date": "2019-10-01T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2019-10-10T06:00:00.000000Z", "legacy_version": "Update A", "number": "2", "summary": "Update A - Included statements from Enea and Green Hills Software." }, { "date": "2019-12-10T07:00:00.000000Z", "legacy_version": "Update B", "number": "3", "summary": "Update B - Added links to vendor advisories." }, { "date": "2020-02-18T07:00:00.000000Z", "legacy_version": "Update C", "number": "4", "summary": "Update C - Added link to Mitsubishi Electric advisory." }, { "date": "2020-05-12T06:00:00.000000Z", "legacy_version": "Update D", "number": "5", "summary": "Update D - Added link to Siemens Power Meter advisory." }, { "date": "2024-09-24T06:00:00.000000Z", "legacy_version": "Update E", "number": "6", "summary": "Update E - Included IDEC Corporation." } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "OSE4", "product": { "name": "ENEA OSE: OSE4", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "OSE" }, { "branches": [ { "category": "product_version", "name": "OSE5", "product": { "name": "ENEA OSE: OSE5", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "OSE" } ], "category": "vendor", "name": "ENEA" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=2003|\u003c=2006", "product": { "name": "Green Hills Software INTEGRITY RTOS: \u003e=2003|\u003c=2006", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "INTEGRITY RTOS" } ], "category": "vendor", "name": "Green Hills Software" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River VxWorks under CURRENT support (6.9.4.11, Vx7 SR540, Vx7 SR610): vers:all/*", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "VxWorks under CURRENT support (6.9.4.11, Vx7 SR540, Vx7 SR610)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=6.5", "product": { "name": "Wind River VxWorks: \u003e=6.5", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River VxWorks bootrom network stack: vers:all/*", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "VxWorks bootrom network stack" }, { "branches": [ { "category": "product_version", "name": "MCE_3.x", "product": { "name": "Wind River VxWorks 653: MCE_3.x", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "VxWorks 653" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River Advanced Networking Technology (ANT): vers:all/*", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "Advanced Networking Technology (ANT)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River Interpeak IPnet TCP/IP Stack: vers:all/*", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "Interpeak IPnet TCP/IP Stack" }, { "branches": [ { "category": "product_version", "name": "7_SR620", "product": { "name": "Wind River VxWorks: 7_SR620", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=5.3|\u003c=6.4", "product": { "name": "Wind River VxWorks: \u003e=5.3|\u003c=6.4", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River VxWorks Cert: vers:all/*", "product_id": "CSAFPID-0012" } } ], "category": "product_name", "name": "VxWorks Cert" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=2.x", "product": { "name": "Wind River VxWorks 653: \u003c=2.x", "product_id": "CSAFPID-0013" } } ], "category": "product_name", "name": "VxWorks 653" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=MCE_3.x_Cert_Edition", "product": { "name": "Wind River VxWorks 653: \u003e=MCE_3.x_Cert_Edition", "product_id": "CSAFPID-0014" } } ], "category": "product_name", "name": "VxWorks 653" } ], "category": "vendor", "name": "Wind River" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12256", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This vulnerability resides in the IPv4 option parsing and may be triggered by IPv4 packets containing invalid options. The most likely outcome of triggering this defect is that the tNet0 task crashes. This vulnerability can result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12256" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12257", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "DHCP packets may go past the local area network (LAN) via DHCP-relays, but are otherwise confined to the LAN. The DHCP-client may be used by VxWorks and in the bootrom. Bootrom, using DHCP/BOOTP, is only vulnerable during the boot-process. This vulnerability may be used to overwrite the heap, which could result in a later crash when a task requests memory from the heap. This vulnerability can result in remote code execution. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12257" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12255", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An attacker can either hijack an existing TCP-session and inject bad TCP-segments or establish a new TCP-session on any TCP-port listened to by the target. This vulnerability could lead to a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow occurs in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12255" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12260", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "This vulnerability could lead to a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12260" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12261", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The impact of this vulnerability is a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12261" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12263", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "This vulnerability relies on a race-condition between the network task (tNet0) and the receiving application. It is very difficult to trigger the race on a system with a single CPU-thread enabled, and there is no way to reliably trigger a race on SMP targets. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12263" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12258", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker with the source and destination TCP-port and IP-addresses of a session can inject invalid TCP-segments into the flow, causing the TCP-session to be reset. An application will see this as an ECONNRESET error message when using the socket after such an attack. The most likely outcome is a crash of the application reading from the affected socket.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12258" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12259", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "This vulnerability requires that at least one IPv4 multicast address has been assigned to the target in an incorrect way (e.g., using the API intended for assigning unicast-addresses). An attacker may use CVE-2019-12264 to incorrectly assign a multicast IP-address. An attacker on the same LAN as the target system may use this vulnerability to cause a NULL-pointer dereference, which most likely will crash the tNet0 task.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12259" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12262", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN can send reverse-ARP responses to the victim system to assign unicast IPv4 addresses to the target.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12262" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12264", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN may choose to hijack a DHCP-client session that requests an IPv4 address. The attacker can send a multicast IP-address in the DHCP offer/ack message, which the victim system then incorrectly assigns. This vulnerability can be combined with CVE-2019-12259 to create a denial-of-service condition.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12264" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12265", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The IGMPv3 reception handler does not expect packets to be spread across multiple IP-fragments.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12265" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] } ] }
ICSMA-19-274-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Gregory Vishnepolsky", "Dor Zusman", "Ben Seri" ], "organization": "Armis", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Information Technology, Healthcare and Public Health, Transportation Systems, Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "general", "text": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSMA-19-274-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsma-19-274-01.json" }, { "category": "self", "summary": "ICS Advisory ICSMA-19-274-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-19-274-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Interpeak IPnet TCP/IP Stack (Update D)", "tracking": { "current_release_date": "2020-01-07T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSMA-19-274-01", "initial_release_date": "2019-10-01T00:00:00.000000Z", "revision_history": [ { "date": "2019-10-01T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSMA-19-274-01 Interpeak IPnet TCP/IP Stack" }, { "date": "2019-10-03T00:00:00.000000Z", "legacy_version": "A", "number": "2", "summary": "ICSMA-19-274-01 Interpeak IPnet TCP/IP Stack (Update A)" }, { "date": "2019-10-10T00:00:00.000000Z", "legacy_version": "B", "number": "3", "summary": "ICSMA-19-274-01 Interpeak IPnet TCP-IP Stack (Update B)" }, { "date": "2019-11-05T00:00:00.000000Z", "legacy_version": "C", "number": "4", "summary": "ICSMA-19-274-01 Interpeak IPnet TCP-IP Stack (Update C)" }, { "date": "2020-01-07T00:00:00.000000Z", "legacy_version": "D", "number": "5", "summary": "ICSMA-19-274-01 Interpeak IPnet TCP/IP Stack (Update D)" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - The Interpeak IPnet stack has been identified to be affected by CVE-2019-12255, CVE-2019-12262, and CVE-2019-12264.", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Ipnet TCP/IP Stack" }, { "branches": [ { "category": "product_version", "name": "4", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - ENEA reports that OSE4 and OSE5 may have been bundled with Interpeak IPnet from 2004-2006. In 2007, ENEA replaced Interpeak IPnet with OSENet.", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "OSE" }, { "branches": [ { "category": "product_version", "name": "5", "product": { "name": "ENEA OSE 5", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "OSE" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 2003 | \u003c= 2006", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - Green Hills Software reports Interpeak IPnet was a third-party add-on for INTREGRITY RTOS from 2003-2006.", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "INTEGRITY RTOS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "All versions of VxWorks under CURRENT support (6.9.4.11, Vx7 SR540, Vx7 SR610) are affected by one or more of the CVE numbers detailed below.", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "VxWorks under CURRENT support (6.9.4.11, Vx7 SR540, Vx7 SR610)" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "All versions of the discontinued product Advanced Networking Technology (ANT) are likely affected by one or more of the CVE numbers below", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Advanced Networking Technology (ANT)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 6.5", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - Older, end-of-life versions of VxWorks back to 6.5 are also affected by one or more of the CVE numbers below.", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - The VxWorks bootrom network stack leverages the same IPnet source as VxWorks, as a result, is also technically vulnerable to CVE-2019-12256. The same patches and mitigations apply to VxWorks and the bootrom network stack; however, the bootrom normally uses statically assigned IP-addresses, not DHCP. If that is true, then the defects related to those protocols do not apply in practice. Also, a successful exploit of the bootrom network stack has a more difficult timing component. In typical applications, the bootrom does not listen to TCP-ports, which means that the TCP-related issues must be timed with the target downloading data from the network.", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "VxWorks bootrom network stack" }, { "branches": [ { "category": "product_version", "name": "653 MCE 3.x", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - VxWorks 653 MCE 3.x may be affected. Contact Wind River customer support (support@windriver.com) for more details.", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "VxWorks" } ], "category": "vendor", "name": "ENEA, Green Hills Software, ITRON, IP Infusion, and Wind River" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12256", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This vulnerability resides in the IPv4 option parsing and may be triggered by IPv4 packets containing invalid options.\nThe most likely outcome of triggering this defect is that the tNet0 task crashes. This vulnerability can result in remote code execution.CVE-2019-12256 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12256" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12257", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "DHCP packets may go past the local area network (LAN) via DHCP-relays, but are otherwise confined to the LAN.\nThe DHCP-client may be used by VxWorks and in the bootrom. Bootrom, using DHCP/BOOTP, is only vulnerable during the boot-process. This vulnerability may be used to overwrite the heap, which could result in a later crash when a task requests memory from the heap. This vulnerability can result in remote code execution.CVE-2019-12257 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12257" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12255", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An attacker can either hijack an existing TCP session and inject bad TCP segments or establish a new TCP session on any TCP port listened to by the target. This vulnerability could lead to a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow occurs in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.. CVE-2019-12255 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).Applications that pass a buffer equal to or larger than a full TCP window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12255" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12260", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "This vulnerability could lead to a buffer overflow of up to a full TCP receive window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.. CVE-2019-12260 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12260" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12261", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The impact of this vulnerability is a buffer overflow of up to a full TCP receive window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.. CVE-2019-12261 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12261" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12263", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "This vulnerability relies on a race-condition between the network task (tNet0) and the receiving application. It is very difficult to trigger the race on a system with a single CPU-thread enabled, and there is no way to reliably trigger a race on SMP targets.CVE-2019-12263 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12263" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12258", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker with the source and destination TCP-port and IP-addresses of a session can inject invalid TCP segments into the flow, causing the TCP-session to be reset. An application will see this as an ECONNRESET error message when using the socket after such an attack. The most likely outcome is a crash of the application reading from the affected socket.. CVE-2019-12258 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).The most likely outcome is a crash of the application reading from the affected socket.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12258" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12264", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "This vulnerability requires that at least one IPv4 multicast address has been assigned to the target in an incorrect way (e.g., using the API intended for assigning unicast addresses). An attacker may use CVE-2019-12264 to incorrectly assign a multicast IP-address.. An attacker on the same LAN as the target system may use this vulnerability to cause a NULL pointer dereference, which most likely will crash the tNet0 task. An attacker on the same LAN as the target system may use this vulnerability to cause a NULL pointer dereference, which most likely will crash the tNet0 task.. CVE-2019-12259 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H).An attacker may use CVE-2019-12264 to incorrectly assign a multicast IP-address.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12264" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12262", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN can send reverse-ARP responses to the victim system to assign unicast IPv4 addresses to the target.CVE-2019-12262 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12262" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12259", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN may choose to hijack a DHCP-client session that requests an IPv4 address. The attacker can send a multicast IP address in the DHCP offer/ack message, which the victim system then incorrectly assigns. This vulnerability can be combined with CVE-2019-12259 to create a denial-of-service condition.. CVE-2019-12264 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H).This vulnerability can be combined with CVE-2019-12259 to create a denial-of-service condition.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12259" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12265", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The IGMPv3 reception handler does not expect packets to be spread across multiple IP-fragments.CVE-2019-12265 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12265" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] } ] }
ICSA-23-320-10
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIPROTEC 4 7SJ66 devices are affected by multiple security vulnerabilities due to the underlying Wind River VxWorks network stack. This stack is affected by nine of the eleven vulnerabilities that are also known as \"URGENT/11\".\n\nThe vulnerabilities could allow an attacker to execute a variety of exploits for the purpose of denial of service (DoS), data extraction, remote code execution, etc. targeting availability, integrity and confidentiality of the devices and data.\n\nSiemens has released a new version for SIPROTEC 4 7SJ66 and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "Operators of critical power systems (e.g. TSOs or DSOs) worldwide are usually required by regulations to build resilience into the power grids by applying multi-level redundant secondary protection schemes. It is therefore recommended that the operators check whether appropriate resilient protection measures are in place. The risk of cyber incidents impacting the grid\u0027s reliability can thus be minimized by virtue of the grid design.\nSiemens strongly recommends applying the provided security updates using the corresponding tooling and documented procedures made available with the product. If supported by the product, an automated means to apply the security updates across multiple product instances may be used. Siemens strongly recommends prior validation of any security update before being applied, and supervision by trained staff of the update process in the target environment. \nAs a general security measure Siemens strongly recommends to protect network access with appropriate mechanisms (e.g. firewalls, segmentation, VPN). It is advised to configure the environment according to our operational guidelines in order to run the devices in a protected IT environment.\n\nRecommended security guidelines can be found at:\n\nhttps://www.siemens.com/gridsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-617233: Urgent/11 TCP/IP Stack Vulnerabilities in SIPROTEC 4 7SJ66 Devices - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-617233.json" }, { "category": "self", "summary": "SSA-617233: Urgent/11 TCP/IP Stack Vulnerabilities in SIPROTEC 4 7SJ66 Devices - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-617233.html" }, { "category": "self", "summary": "SSA-617233: Urgent/11 TCP/IP Stack Vulnerabilities in SIPROTEC 4 7SJ66 Devices - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-617233.pdf" }, { "category": "self", "summary": "SSA-617233: Urgent/11 TCP/IP Stack Vulnerabilities in SIPROTEC 4 7SJ66 Devices - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-617233.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-23-320-10 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-320-10.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-320-10 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIPROTEC 4 7SJ66", "tracking": { "current_release_date": "2023-11-14T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-320-10", "initial_release_date": "2023-11-14T00:00:00.000000Z", "revision_history": [ { "date": "2023-11-14T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV4.41", "product": { "name": "SIPROTEC 4 7SJ66", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIPROTEC 4 7SJ66" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12255", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks has a Buffer Overflow in the TCP component (issue 1 of 4). This is a IPNET security vulnerability: TCP Urgent Pointer = 0 that leads to an integer underflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12255" }, { "cve": "CVE-2019-12256", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the IPv4 component. There is an IPNET security vulnerability: Stack overflow in the parsing of IPv4 packets\u2019 IP options.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12256" }, { "cve": "CVE-2019-12258", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability: DoS of TCP connection via malformed TCP options.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12258" }, { "cve": "CVE-2019-12259", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and vx7 has an array index error in the IGMPv3 client component. There is an IPNET security vulnerability: DoS via NULL dereference in IGMP parsing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12259" }, { "cve": "CVE-2019-12260", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the TCP component (issue 2 of 4). This is an IPNET security vulnerability: TCP Urgent Pointer state confusion caused by a malformed TCP AO option.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12260" }, { "cve": "CVE-2019-12261", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.7 though 6.9 and vx7 has a Buffer Overflow in the TCP component (issue 3 of 4). This is an IPNET security vulnerability: TCP Urgent Pointer state confusion during connect() to a remote host.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12261" }, { "cve": "CVE-2019-12262", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and 7 has Incorrect Access Control in the RARP client component. IPNET security vulnerability: Handling of unsolicited Reverse ARP replies (Logical Flaw).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12262" }, { "cve": "CVE-2019-12263", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.9.4 and vx7 has a Buffer Overflow in the TCP component (issue 4 of 4). There is an IPNET security vulnerability: TCP Urgent Pointer state confusion due to race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12263" }, { "cve": "CVE-2019-12265", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12265" } ] }
ICSA-19-274-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Gregory Vishnepolsky", "Dor Zusman", "Ben Seri" ], "organization": "Armis", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Information Technology, Healthcare and Public Health, Transportation Systems, Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Sweden, United States", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Do not click web links or open attachments in unsolicited email messages.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-274-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-274-01.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-19-274-01 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-274-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Interpeak IPnet TCP/IP Stack (Update E)", "tracking": { "current_release_date": "2024-09-24T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-274-01", "initial_release_date": "2019-10-01T06:00:00.000000Z", "revision_history": [ { "date": "2019-10-01T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2019-10-10T06:00:00.000000Z", "legacy_version": "Update A", "number": "2", "summary": "Update A - Included statements from Enea and Green Hills Software." }, { "date": "2019-12-10T07:00:00.000000Z", "legacy_version": "Update B", "number": "3", "summary": "Update B - Added links to vendor advisories." }, { "date": "2020-02-18T07:00:00.000000Z", "legacy_version": "Update C", "number": "4", "summary": "Update C - Added link to Mitsubishi Electric advisory." }, { "date": "2020-05-12T06:00:00.000000Z", "legacy_version": "Update D", "number": "5", "summary": "Update D - Added link to Siemens Power Meter advisory." }, { "date": "2024-09-24T06:00:00.000000Z", "legacy_version": "Update E", "number": "6", "summary": "Update E - Included IDEC Corporation." } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "OSE4", "product": { "name": "ENEA OSE: OSE4", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "OSE" }, { "branches": [ { "category": "product_version", "name": "OSE5", "product": { "name": "ENEA OSE: OSE5", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "OSE" } ], "category": "vendor", "name": "ENEA" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=2003|\u003c=2006", "product": { "name": "Green Hills Software INTEGRITY RTOS: \u003e=2003|\u003c=2006", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "INTEGRITY RTOS" } ], "category": "vendor", "name": "Green Hills Software" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River VxWorks under CURRENT support (6.9.4.11, Vx7 SR540, Vx7 SR610): vers:all/*", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "VxWorks under CURRENT support (6.9.4.11, Vx7 SR540, Vx7 SR610)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=6.5", "product": { "name": "Wind River VxWorks: \u003e=6.5", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River VxWorks bootrom network stack: vers:all/*", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "VxWorks bootrom network stack" }, { "branches": [ { "category": "product_version", "name": "MCE_3.x", "product": { "name": "Wind River VxWorks 653: MCE_3.x", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "VxWorks 653" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River Advanced Networking Technology (ANT): vers:all/*", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "Advanced Networking Technology (ANT)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River Interpeak IPnet TCP/IP Stack: vers:all/*", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "Interpeak IPnet TCP/IP Stack" }, { "branches": [ { "category": "product_version", "name": "7_SR620", "product": { "name": "Wind River VxWorks: 7_SR620", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=5.3|\u003c=6.4", "product": { "name": "Wind River VxWorks: \u003e=5.3|\u003c=6.4", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River VxWorks Cert: vers:all/*", "product_id": "CSAFPID-0012" } } ], "category": "product_name", "name": "VxWorks Cert" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=2.x", "product": { "name": "Wind River VxWorks 653: \u003c=2.x", "product_id": "CSAFPID-0013" } } ], "category": "product_name", "name": "VxWorks 653" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=MCE_3.x_Cert_Edition", "product": { "name": "Wind River VxWorks 653: \u003e=MCE_3.x_Cert_Edition", "product_id": "CSAFPID-0014" } } ], "category": "product_name", "name": "VxWorks 653" } ], "category": "vendor", "name": "Wind River" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12256", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This vulnerability resides in the IPv4 option parsing and may be triggered by IPv4 packets containing invalid options. The most likely outcome of triggering this defect is that the tNet0 task crashes. This vulnerability can result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12256" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12257", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "DHCP packets may go past the local area network (LAN) via DHCP-relays, but are otherwise confined to the LAN. The DHCP-client may be used by VxWorks and in the bootrom. Bootrom, using DHCP/BOOTP, is only vulnerable during the boot-process. This vulnerability may be used to overwrite the heap, which could result in a later crash when a task requests memory from the heap. This vulnerability can result in remote code execution. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12257" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12255", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An attacker can either hijack an existing TCP-session and inject bad TCP-segments or establish a new TCP-session on any TCP-port listened to by the target. This vulnerability could lead to a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow occurs in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12255" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12260", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "This vulnerability could lead to a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12260" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12261", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The impact of this vulnerability is a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12261" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12263", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "This vulnerability relies on a race-condition between the network task (tNet0) and the receiving application. It is very difficult to trigger the race on a system with a single CPU-thread enabled, and there is no way to reliably trigger a race on SMP targets. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12263" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12258", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker with the source and destination TCP-port and IP-addresses of a session can inject invalid TCP-segments into the flow, causing the TCP-session to be reset. An application will see this as an ECONNRESET error message when using the socket after such an attack. The most likely outcome is a crash of the application reading from the affected socket.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12258" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12259", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "This vulnerability requires that at least one IPv4 multicast address has been assigned to the target in an incorrect way (e.g., using the API intended for assigning unicast-addresses). An attacker may use CVE-2019-12264 to incorrectly assign a multicast IP-address. An attacker on the same LAN as the target system may use this vulnerability to cause a NULL-pointer dereference, which most likely will crash the tNet0 task.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12259" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2019-12262", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN can send reverse-ARP responses to the victim system to assign unicast IPv4 addresses to the target.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12262" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12264", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN may choose to hijack a DHCP-client session that requests an IPv4 address. The attacker can send a multicast IP-address in the DHCP offer/ack message, which the victim system then incorrectly assigns. This vulnerability can be combined with CVE-2019-12259 to create a denial-of-service condition.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12264" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12265", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The IGMPv3 reception handler does not expect packets to be spread across multiple IP-fragments.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "known_not_affected": [ "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12265" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Wind River has identified the following specific workarounds and mitigations users can apply to reduce risk:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "All affected products: To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-211-01" }, { "category": "mitigation", "details": "All affected products: For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory at: https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "ABB", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://library.e.abb.com/public/e9f0a4adff5d4fe8b8c76a11db3d3fe7/Industrial%20Automation%20Cyber%20Security%20Notification%20-%20Wind%20River%20VxWorks%20IPNET%20Vulnerabilities%20Draft%20v1.pdf?x-sign=D/eTHfsfWoYM2o++QsdhvErkm9WrxRfKs/inWA21y6WTwUJYSUOqOclqiMs2jksQ" }, { "category": "mitigation", "details": "Avaya", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "mitigation", "details": "Belden Industrial Devices", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.belden.com/hubfs/support/security/bulletins/Belden_Security_Bulletin_BSECV-2019-05_1v0.pdf?hsLang=en" }, { "category": "mitigation", "details": "ExtremeNetworks", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.extremenetworks.com/extreme-networks-blog/what-you-should-do-about-the-urgent-11-vxworks-vulnerabilities/" }, { "category": "mitigation", "details": "IDEC Corporation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://us.idec.com/media/24-RD-0300-EN.pdf" }, { "category": "mitigation", "details": "Mitsubishi Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf" }, { "category": "mitigation", "details": "NetApp", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "category": "mitigation", "details": "Rockwell Automation", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.schneider-electric.com/en/download/document/SESB-2019-214-01/" }, { "category": "mitigation", "details": "Siemens (Power Meters)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "category": "mitigation", "details": "Siemens (RUGGEDCOM)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "category": "mitigation", "details": "Siemens (SIPROTEC 5)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "category": "mitigation", "details": "Sonicwall Firewalls", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906" }, { "category": "mitigation", "details": "TrendMicro IPS", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://success.trendmicro.com/solution/TP000142898-PB-1080-Wind-River-VxWorks-Vulnerabilities-URGENT-11" }, { "category": "mitigation", "details": "Woodward", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://support.woodward.com/en/kb/articles/preliminary-notice-woodward-security-bulletin-01661-urgent-11" }, { "category": "mitigation", "details": "Xerox Printers", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Xylem", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-vxworks-security-notification.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] } ] }
icsa-19-211-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Wind River", "summary": "reporting these vulnerabilities to CISA with Armis researchers" }, { "names": [ "Gregory Vishnepolsky", "Dor Zusman", "Ben Seri" ], "organization": "Armis", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Information Technology, Healthcare and Public Health, Transportation Systems, Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "United States", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Recommended Practices" }, { "category": "general", "text": "All versions of VxWorks under CURRENT support (6.9.4.11, Vx7 SR540, Vx7 SR610) are affected by one or more of the CVE numbers detailed below.", "title": "Notes on Affected Products" }, { "category": "general", "text": "Older, End-of-Life versions of VxWorks back to 6.5 are also affected by one or more of the CVE numbers below.", "title": "Notes on Affected Products" }, { "category": "general", "text": "All versions of the discontinued product Advanced Networking Technology (ANT) are likely affected by one or more of the CVE numbers below.", "title": "Notes on Affected Products" }, { "category": "general", "text": "The VxWorks bootrom network stack leverages the same IPnet source as VxWorks and, as a result, is also technically vulnerable to CVE-2019-12256. The same patches and mitigations apply to VxWorks and the bootrom network stack. However, the bootrom normally uses statically assigned IP-addresses, not DHCP. If that is true, then the defects related to those protocols do not apply in practice. Also a successful exploit of the bootrom network stack has a more difficult timing component. In typical applications, the bootrom does not listen to TCP-ports, which means that the TCP-related issues must be timed with the target downloading data from the network.", "title": "Notes on Affected Products" }, { "category": "general", "text": "VxWorks 653 MCE 3.x may be affected. Contact Wind River customer support (support@windriver.com) for more details.", "title": "Notes on Affected Products" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-211-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-211-01.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-19-211-01 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-211-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" } ], "title": "Wind River VxWorks (Update A)", "tracking": { "current_release_date": "2019-08-08T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-211-01", "initial_release_date": "2019-07-30T06:00:00.000000Z", "revision_history": [ { "date": "2019-07-30T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2019-08-08T06:00:00.000000Z", "legacy_version": "Update A", "number": "2", "summary": "Update A - Added advisory references for Schneider Electric and Dr\u00e4ger" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "6.9.4.11", "product": { "name": "Wind River VxWorks: 6.9.4.11", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version", "name": "SR540", "product": { "name": "Wind River VxWorks Vx7: SR540", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "VxWorks Vx7" }, { "branches": [ { "category": "product_version", "name": "SR610", "product": { "name": "Wind River VxWorks Vx7: SR610", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "VxWorks Vx7" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=6.5", "product": { "name": "Wind River VxWorks End-of-Life: \u003e=6.5", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "VxWorks End-of-Life" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River Advanced Networking Technology (ANT): vers:all/*", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Advanced Networking Technology (ANT)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River VxWorks bootrom network stack: vers:all/*", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "VxWorks bootrom network stack" }, { "branches": [ { "category": "product_version", "name": "MCE_3.x", "product": { "name": "Wind River VxWorks 653: MCE_3.x", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "VxWorks 653" }, { "branches": [ { "category": "product_version", "name": "SR620", "product": { "name": "Wind River VxWorks 7: SR620", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "VxWorks 7" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=5.3|\u003c=6.4", "product": { "name": "Wind River VxWorks: \u003e=5.3|\u003c=6.4", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Wind River VxWorks Cert: vers:all/*", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "VxWorks Cert" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=2.x", "product": { "name": "Wind River VxWorks 653: \u003c=2.x", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "VxWorks 653" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=MCE_3.x_Cert_Edition", "product": { "name": "Wind River VxWorks 653: \u003e=MCE_3.x_Cert_Edition", "product_id": "CSAFPID-0012" } } ], "category": "product_name", "name": "VxWorks 653" } ], "category": "vendor", "name": "Wind River" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12256", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This vulnerability resides in the IPv4 option parsing and may be triggered by IPv4 packets containing invalid options. The most likely outcome of triggering this defect is that the tNet0 task crashes. This vulnerability can result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12256" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12257", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "DHCP packets may go past the local area network (LAN) via DHCP-relays, but are otherwise confined to the LAN. The DHCP-client may be used by VxWorks and in the bootrom. Bootrom, using DHCP/BOOTP, is only vulnerable during the boot-process. This vulnerability may be used to overwrite the heap, which could result in a later crash when a task requests memory from the heap. This vulnerability can result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12257" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12255", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An attacker can either hijack an existing TCP-session and inject bad TCP-segments or establish a new TCP-session on any TCP-port listened to by the target. This vulnerability could lead to a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow occurs in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12255" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12260", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "This vulnerability could lead to a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12260" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12261", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The impact of this vulnerability is a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP-window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12261" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12263", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "This vulnerability relies on a race-condition between the network task (tNet0) and the receiving application. It is very difficult to trigger the race on a system with a single CPU-thread enabled, and there is no way to reliably trigger a race on SMP targets.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12263" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12258", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker with the source and destination TCP-port and IP-addresses of a session can inject invalid TCP-segments into the flow, causing the TCP-session to be reset. An application will see this as an ECONNRESET error message when using the socket after such an attack. The most likely outcome is a crash of the application reading from the affected socket.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12258" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12259", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "This vulnerability requires that at least one IPv4 multicast address has been assigned to the target in an incorrect way (e.g., using the API intended for assigning unicast-addresses). An attacker may use CVE-2019-12264 to incorrectly assign a multicast IP-address. An attacker on the same LAN as the target system may use this vulnerability to cause a NULL-pointer dereference, which most likely will crash the tNet0 task.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12259" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12262", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN can send reverse-ARP responses to the victim system to assign unicast IPv4 addresses to the target.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12262" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12264", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN may choose to hijack a DHCP-client session that requests an IPv4 address. The attacker can send a multicast IP-address in the DHCP offer/ack message, which the victim system then incorrectly assigns. This vulnerability can be combined with CVE-2019-12259 to create a denial-of-service condition.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12264" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2019-12265", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The IGMPv3 reception handler does not expect packets to be spread across multiple IP-fragments.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "known_not_affected": [ "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12265" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "mailto:PSIRT@windriver.com" }, { "category": "mitigation", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "mitigation", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Rockwell Automation (login required)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1088561" }, { "category": "mitigation", "details": "Xerox", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://security.business.xerox.com/en-us/news/wind-river-vxworks-ipnet-tcp-ip-stack-vulnerabilities/" }, { "category": "mitigation", "details": "Dr\u00e4ger", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://static.draeger.com/security" }, { "category": "mitigation", "details": "Schneider Electric", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ], "url": "https://www.se.com/ww/en/download/document/SESB-2019-214-01/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0007" ] } ] } ] }
icsa-23-320-10
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIPROTEC 4 7SJ66 devices are affected by multiple security vulnerabilities due to the underlying Wind River VxWorks network stack. This stack is affected by nine of the eleven vulnerabilities that are also known as \"URGENT/11\".\n\nThe vulnerabilities could allow an attacker to execute a variety of exploits for the purpose of denial of service (DoS), data extraction, remote code execution, etc. targeting availability, integrity and confidentiality of the devices and data.\n\nSiemens has released a new version for SIPROTEC 4 7SJ66 and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "Operators of critical power systems (e.g. TSOs or DSOs) worldwide are usually required by regulations to build resilience into the power grids by applying multi-level redundant secondary protection schemes. It is therefore recommended that the operators check whether appropriate resilient protection measures are in place. The risk of cyber incidents impacting the grid\u0027s reliability can thus be minimized by virtue of the grid design.\nSiemens strongly recommends applying the provided security updates using the corresponding tooling and documented procedures made available with the product. If supported by the product, an automated means to apply the security updates across multiple product instances may be used. Siemens strongly recommends prior validation of any security update before being applied, and supervision by trained staff of the update process in the target environment. \nAs a general security measure Siemens strongly recommends to protect network access with appropriate mechanisms (e.g. firewalls, segmentation, VPN). It is advised to configure the environment according to our operational guidelines in order to run the devices in a protected IT environment.\n\nRecommended security guidelines can be found at:\n\nhttps://www.siemens.com/gridsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-617233: Urgent/11 TCP/IP Stack Vulnerabilities in SIPROTEC 4 7SJ66 Devices - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-617233.json" }, { "category": "self", "summary": "SSA-617233: Urgent/11 TCP/IP Stack Vulnerabilities in SIPROTEC 4 7SJ66 Devices - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-617233.html" }, { "category": "self", "summary": "SSA-617233: Urgent/11 TCP/IP Stack Vulnerabilities in SIPROTEC 4 7SJ66 Devices - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-617233.pdf" }, { "category": "self", "summary": "SSA-617233: Urgent/11 TCP/IP Stack Vulnerabilities in SIPROTEC 4 7SJ66 Devices - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-617233.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-23-320-10 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-320-10.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-320-10 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIPROTEC 4 7SJ66", "tracking": { "current_release_date": "2023-11-14T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-320-10", "initial_release_date": "2023-11-14T00:00:00.000000Z", "revision_history": [ { "date": "2023-11-14T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV4.41", "product": { "name": "SIPROTEC 4 7SJ66", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIPROTEC 4 7SJ66" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12255", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks has a Buffer Overflow in the TCP component (issue 1 of 4). This is a IPNET security vulnerability: TCP Urgent Pointer = 0 that leads to an integer underflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12255" }, { "cve": "CVE-2019-12256", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the IPv4 component. There is an IPNET security vulnerability: Stack overflow in the parsing of IPv4 packets\u2019 IP options.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12256" }, { "cve": "CVE-2019-12258", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability: DoS of TCP connection via malformed TCP options.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12258" }, { "cve": "CVE-2019-12259", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and vx7 has an array index error in the IGMPv3 client component. There is an IPNET security vulnerability: DoS via NULL dereference in IGMP parsing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12259" }, { "cve": "CVE-2019-12260", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the TCP component (issue 2 of 4). This is an IPNET security vulnerability: TCP Urgent Pointer state confusion caused by a malformed TCP AO option.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12260" }, { "cve": "CVE-2019-12261", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.7 though 6.9 and vx7 has a Buffer Overflow in the TCP component (issue 3 of 4). This is an IPNET security vulnerability: TCP Urgent Pointer state confusion during connect() to a remote host.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12261" }, { "cve": "CVE-2019-12262", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and 7 has Incorrect Access Control in the RARP client component. IPNET security vulnerability: Handling of unsolicited Reverse ARP replies (Logical Flaw).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12262" }, { "cve": "CVE-2019-12263", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.9.4 and vx7 has a Buffer Overflow in the TCP component (issue 4 of 4). There is an IPNET security vulnerability: TCP Urgent Pointer state confusion due to race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12263" }, { "cve": "CVE-2019-12265", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.41 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109743555/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-12265" } ] }
icsma-19-274-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Gregory Vishnepolsky", "Dor Zusman", "Ben Seri" ], "organization": "Armis", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Information Technology, Healthcare and Public Health, Transportation Systems, Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "general", "text": "ZebOS by IP Infusion has not yet responded to CISA inquiries.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSMA-19-274-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsma-19-274-01.json" }, { "category": "self", "summary": "ICS Advisory ICSMA-19-274-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-19-274-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Interpeak IPnet TCP/IP Stack (Update D)", "tracking": { "current_release_date": "2020-01-07T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSMA-19-274-01", "initial_release_date": "2019-10-01T00:00:00.000000Z", "revision_history": [ { "date": "2019-10-01T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSMA-19-274-01 Interpeak IPnet TCP/IP Stack" }, { "date": "2019-10-03T00:00:00.000000Z", "legacy_version": "A", "number": "2", "summary": "ICSMA-19-274-01 Interpeak IPnet TCP/IP Stack (Update A)" }, { "date": "2019-10-10T00:00:00.000000Z", "legacy_version": "B", "number": "3", "summary": "ICSMA-19-274-01 Interpeak IPnet TCP-IP Stack (Update B)" }, { "date": "2019-11-05T00:00:00.000000Z", "legacy_version": "C", "number": "4", "summary": "ICSMA-19-274-01 Interpeak IPnet TCP-IP Stack (Update C)" }, { "date": "2020-01-07T00:00:00.000000Z", "legacy_version": "D", "number": "5", "summary": "ICSMA-19-274-01 Interpeak IPnet TCP/IP Stack (Update D)" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - The Interpeak IPnet stack has been identified to be affected by CVE-2019-12255, CVE-2019-12262, and CVE-2019-12264.", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Ipnet TCP/IP Stack" }, { "branches": [ { "category": "product_version", "name": "4", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - ENEA reports that OSE4 and OSE5 may have been bundled with Interpeak IPnet from 2004-2006. In 2007, ENEA replaced Interpeak IPnet with OSENet.", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "OSE" }, { "branches": [ { "category": "product_version", "name": "5", "product": { "name": "ENEA OSE 5", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "OSE" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 2003 | \u003c= 2006", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - Green Hills Software reports Interpeak IPnet was a third-party add-on for INTREGRITY RTOS from 2003-2006.", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "INTEGRITY RTOS" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "All versions of VxWorks under CURRENT support (6.9.4.11, Vx7 SR540, Vx7 SR610) are affected by one or more of the CVE numbers detailed below.", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "VxWorks under CURRENT support (6.9.4.11, Vx7 SR540, Vx7 SR610)" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "All versions of the discontinued product Advanced Networking Technology (ANT) are likely affected by one or more of the CVE numbers below", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Advanced Networking Technology (ANT)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 6.5", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - Older, end-of-life versions of VxWorks back to 6.5 are also affected by one or more of the CVE numbers below.", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "VxWorks" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - The VxWorks bootrom network stack leverages the same IPnet source as VxWorks, as a result, is also technically vulnerable to CVE-2019-12256. The same patches and mitigations apply to VxWorks and the bootrom network stack; however, the bootrom normally uses statically assigned IP-addresses, not DHCP. If that is true, then the defects related to those protocols do not apply in practice. Also, a successful exploit of the bootrom network stack has a more difficult timing component. In typical applications, the bootrom does not listen to TCP-ports, which means that the TCP-related issues must be timed with the target downloading data from the network.", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "VxWorks bootrom network stack" }, { "branches": [ { "category": "product_version", "name": "653 MCE 3.x", "product": { "name": "OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River - VxWorks 653 MCE 3.x may be affected. Contact Wind River customer support (support@windriver.com) for more details.", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "VxWorks" } ], "category": "vendor", "name": "ENEA, Green Hills Software, ITRON, IP Infusion, and Wind River" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12256", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This vulnerability resides in the IPv4 option parsing and may be triggered by IPv4 packets containing invalid options.\nThe most likely outcome of triggering this defect is that the tNet0 task crashes. This vulnerability can result in remote code execution.CVE-2019-12256 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12256" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12257", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "DHCP packets may go past the local area network (LAN) via DHCP-relays, but are otherwise confined to the LAN.\nThe DHCP-client may be used by VxWorks and in the bootrom. Bootrom, using DHCP/BOOTP, is only vulnerable during the boot-process. This vulnerability may be used to overwrite the heap, which could result in a later crash when a task requests memory from the heap. This vulnerability can result in remote code execution.CVE-2019-12257 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12257" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12255", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An attacker can either hijack an existing TCP session and inject bad TCP segments or establish a new TCP session on any TCP port listened to by the target. This vulnerability could lead to a buffer overflow of up to a full TCP receive-window (by default, 10k-64k depending on version). The buffer overflow occurs in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.. CVE-2019-12255 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).Applications that pass a buffer equal to or larger than a full TCP window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12255" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12260", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "This vulnerability could lead to a buffer overflow of up to a full TCP receive window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.. CVE-2019-12260 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12260" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12261", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The impact of this vulnerability is a buffer overflow of up to a full TCP receive window (by default, 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP window are not susceptible to this attack. Applications passing a stack-allocated variable as a buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.. CVE-2019-12261 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).The most likely outcome is a crash of the application reading from the affected socket, which could result in remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12261" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12263", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "This vulnerability relies on a race-condition between the network task (tNet0) and the receiving application. It is very difficult to trigger the race on a system with a single CPU-thread enabled, and there is no way to reliably trigger a race on SMP targets.CVE-2019-12263 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12263" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12258", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker with the source and destination TCP-port and IP-addresses of a session can inject invalid TCP segments into the flow, causing the TCP-session to be reset. An application will see this as an ECONNRESET error message when using the socket after such an attack. The most likely outcome is a crash of the application reading from the affected socket.. CVE-2019-12258 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).The most likely outcome is a crash of the application reading from the affected socket.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12258" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12264", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "This vulnerability requires that at least one IPv4 multicast address has been assigned to the target in an incorrect way (e.g., using the API intended for assigning unicast addresses). An attacker may use CVE-2019-12264 to incorrectly assign a multicast IP-address.. An attacker on the same LAN as the target system may use this vulnerability to cause a NULL pointer dereference, which most likely will crash the tNet0 task. An attacker on the same LAN as the target system may use this vulnerability to cause a NULL pointer dereference, which most likely will crash the tNet0 task.. CVE-2019-12259 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H).An attacker may use CVE-2019-12264 to incorrectly assign a multicast IP-address.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12264" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12262", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN can send reverse-ARP responses to the victim system to assign unicast IPv4 addresses to the target.CVE-2019-12262 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12262" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12259", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker residing on the LAN may choose to hijack a DHCP-client session that requests an IPv4 address. The attacker can send a multicast IP address in the DHCP offer/ack message, which the victim system then incorrectly assigns. This vulnerability can be combined with CVE-2019-12259 to create a denial-of-service condition.. CVE-2019-12264 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H).This vulnerability can be combined with CVE-2019-12259 to create a denial-of-service condition.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12259" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] }, { "cve": "CVE-2019-12265", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The IGMPv3 reception handler does not expect packets to be spread across multiple IP-fragments.CVE-2019-12265 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12265" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Enea has no IPNet customers on support contract in the United States.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Green Hills Software has proactively informed affected users and offers consulting services to implement mitigations.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Microsoft states they have no history of support or integration work to include IPnet and have not released a version of ThreadX bundled with IPnet. Microsoft does caution that some hardware makers could have used ThreadX and a custom set IPnet in the hardware.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "TRON Forum reports they only publish the specification for ITRON RTOS. Various implementations are used by many users world-wide and are created by various implementors (some commercial, and some academic and some government) according the specification document. TRON Forum, the caretaker of the ITRON specification, has not endorsed the use of any particular TCP/IP stack including one from Interpeak. The choice of TCP/IP stack is up to the RTOS vendor and application developers, and thus each application user needs to check whether TCP/IP stack developed by Interpeak is used inside their application. TRON Forum will send out a preliminary warning to members by mailing list to notify implementors of the reported vulnerabilities.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "Wind River has produced controls and patches to mitigate the reported vulnerabilities. To obtain patches, email PSIRT@windriver.com and indicate the VxWorks major version for which you need source patches.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" }, { "category": "vendor_fix", "details": "For more detailed information on the vulnerabilities and the mitigating controls, please see the Wind River advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "category": "vendor_fix", "details": "Additional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ], "url": "https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/urgent-11-vulnerability-in-vxworks-ipnet-service/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009" ] } ] } ] }
WID-SEC-W-2023-2884
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "VxWorks ist ein propriet\u00e4res Echtzeitbetriebssystem, das von Wind River Systems entwickelt wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Wind River VxWorks ausnutzen, um dadurch die Integrit\u00e4t, Vertraulichkeit und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Sonstiges\n- Hardware Appliance\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2884 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-2884.json" }, { "category": "self", "summary": "WID-SEC-2023-2884 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2884" }, { "category": "external", "summary": "Siemens Security Advisory SSA-617233 vom 2023-11-14", "url": "https://cert-portal.siemens.com/productcert/html/ssa-617233.html" }, { "category": "external", "summary": "Wind River Security Advisory vom 2019-07-29", "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/" }, { "category": "external", "summary": "Xerox Mini Bulletin XRX19AA vom 2019-10-06", "url": "https://security.business.xerox.com/wp-content/uploads/2019/10/cert_Security_Mini_Bulletin_XRX19AA_for_Phaser3635MFP.pdf" }, { "category": "external", "summary": "Avaya Security Advisory ASA-2019-210 vom 2019-10-29", "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "external", "summary": "ABB Cyber Security Advisory 1MRG000001", "url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRG000001\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "external", "summary": "ABB Security Advisory 1MRG037536", "url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRG035816\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source_lang": "en-US", "title": "Wind River VxWorks: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-13T23:00:00.000+00:00", "generator": { "date": "2024-08-15T18:01:27.788+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2884", "initial_release_date": "2019-07-29T22:00:00.000+00:00", "revision_history": [ { "date": "2019-07-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2019-10-06T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Xerox" }, { "date": "2019-10-29T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Avaya" }, { "date": "2020-07-15T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von ABB aufgenommen" }, { "date": "2023-11-13T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Siemens aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Avaya Media Gateway", "product": { "name": "Avaya Media Gateway", "product_id": "T015276", "product_identification_helper": { "cpe": "cpe:/h:avaya:media_gateway:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Hitachi Energy AFS", "product": { "name": "Hitachi Energy AFS", "product_id": "T016942", "product_identification_helper": { "cpe": "cpe:/h:abb:afs:-" } } }, { "branches": [ { "category": "product_name", "name": "Hitachi Energy Relion 670", "product": { "name": "Hitachi Energy Relion 670", "product_id": "T016943", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:670" } } }, { "category": "product_name", "name": "Hitachi Energy Relion 650", "product": { "name": "Hitachi Energy Relion 650", "product_id": "T016944", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:650" } } }, { "category": "product_name", "name": "Hitachi Energy Relion SAM600-IO", "product": { "name": "Hitachi Energy Relion SAM600-IO", "product_id": "T016945", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:sam600-io" } } } ], "category": "product_name", "name": "Relion" } ], "category": "vendor", "name": "Hitachi Energy" }, { "branches": [ { "category": "product_name", "name": "Siemens SIPROTEC \u003c 4 7SJ66 V4.41", "product": { "name": "Siemens SIPROTEC \u003c 4 7SJ66 V4.41", "product_id": "T031080", "product_identification_helper": { "cpe": "cpe:/h:siemens:siprotec:4_7sj66_v4.41" } } } ], "category": "vendor", "name": "Siemens" }, { "branches": [ { "category": "product_name", "name": "Wind River VxWorks \u003c 7 SR620", "product": { "name": "Wind River VxWorks \u003c 7 SR620", "product_id": "T014735", "product_identification_helper": { "cpe": "cpe:/o:windriver:vxworks:7_sr620" } } } ], "category": "vendor", "name": "Wind River" }, { "branches": [ { "category": "product_name", "name": "Xerox Phaser 3635MFP", "product": { "name": "Xerox Phaser 3635MFP", "product_id": "T015110", "product_identification_helper": { "cpe": "cpe:/h:xerox:phaser:3635mfp" } } } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12255", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12255" }, { "cve": "CVE-2019-12256", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12256" }, { "cve": "CVE-2019-12257", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12257" }, { "cve": "CVE-2019-12258", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12258" }, { "cve": "CVE-2019-12259", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12259" }, { "cve": "CVE-2019-12260", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12260" }, { "cve": "CVE-2019-12261", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12261" }, { "cve": "CVE-2019-12262", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12262" }, { "cve": "CVE-2019-12263", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12263" }, { "cve": "CVE-2019-12264", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12264" }, { "cve": "CVE-2019-12265", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12265" } ] }
wid-sec-w-2023-2884
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "VxWorks ist ein propriet\u00e4res Echtzeitbetriebssystem, das von Wind River Systems entwickelt wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Wind River VxWorks ausnutzen, um dadurch die Integrit\u00e4t, Vertraulichkeit und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Sonstiges\n- Hardware Appliance\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2884 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-2884.json" }, { "category": "self", "summary": "WID-SEC-2023-2884 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2884" }, { "category": "external", "summary": "Siemens Security Advisory SSA-617233 vom 2023-11-14", "url": "https://cert-portal.siemens.com/productcert/html/ssa-617233.html" }, { "category": "external", "summary": "Wind River Security Advisory vom 2019-07-29", "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/" }, { "category": "external", "summary": "Xerox Mini Bulletin XRX19AA vom 2019-10-06", "url": "https://security.business.xerox.com/wp-content/uploads/2019/10/cert_Security_Mini_Bulletin_XRX19AA_for_Phaser3635MFP.pdf" }, { "category": "external", "summary": "Avaya Security Advisory ASA-2019-210 vom 2019-10-29", "url": "https://downloads.avaya.com/css/P8/documents/101060489" }, { "category": "external", "summary": "ABB Cyber Security Advisory 1MRG000001", "url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRG000001\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "external", "summary": "ABB Security Advisory 1MRG037536", "url": "https://search.abb.com/library/Download.aspx?DocumentID=1MRG035816\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source_lang": "en-US", "title": "Wind River VxWorks: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-13T23:00:00.000+00:00", "generator": { "date": "2024-08-15T18:01:27.788+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2884", "initial_release_date": "2019-07-29T22:00:00.000+00:00", "revision_history": [ { "date": "2019-07-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2019-10-06T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Xerox" }, { "date": "2019-10-29T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Avaya" }, { "date": "2020-07-15T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von ABB aufgenommen" }, { "date": "2023-11-13T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Siemens aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Avaya Media Gateway", "product": { "name": "Avaya Media Gateway", "product_id": "T015276", "product_identification_helper": { "cpe": "cpe:/h:avaya:media_gateway:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Hitachi Energy AFS", "product": { "name": "Hitachi Energy AFS", "product_id": "T016942", "product_identification_helper": { "cpe": "cpe:/h:abb:afs:-" } } }, { "branches": [ { "category": "product_name", "name": "Hitachi Energy Relion 670", "product": { "name": "Hitachi Energy Relion 670", "product_id": "T016943", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:670" } } }, { "category": "product_name", "name": "Hitachi Energy Relion 650", "product": { "name": "Hitachi Energy Relion 650", "product_id": "T016944", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:650" } } }, { "category": "product_name", "name": "Hitachi Energy Relion SAM600-IO", "product": { "name": "Hitachi Energy Relion SAM600-IO", "product_id": "T016945", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:sam600-io" } } } ], "category": "product_name", "name": "Relion" } ], "category": "vendor", "name": "Hitachi Energy" }, { "branches": [ { "category": "product_name", "name": "Siemens SIPROTEC \u003c 4 7SJ66 V4.41", "product": { "name": "Siemens SIPROTEC \u003c 4 7SJ66 V4.41", "product_id": "T031080", "product_identification_helper": { "cpe": "cpe:/h:siemens:siprotec:4_7sj66_v4.41" } } } ], "category": "vendor", "name": "Siemens" }, { "branches": [ { "category": "product_name", "name": "Wind River VxWorks \u003c 7 SR620", "product": { "name": "Wind River VxWorks \u003c 7 SR620", "product_id": "T014735", "product_identification_helper": { "cpe": "cpe:/o:windriver:vxworks:7_sr620" } } } ], "category": "vendor", "name": "Wind River" }, { "branches": [ { "category": "product_name", "name": "Xerox Phaser 3635MFP", "product": { "name": "Xerox Phaser 3635MFP", "product_id": "T015110", "product_identification_helper": { "cpe": "cpe:/h:xerox:phaser:3635mfp" } } } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12255", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12255" }, { "cve": "CVE-2019-12256", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12256" }, { "cve": "CVE-2019-12257", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12257" }, { "cve": "CVE-2019-12258", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12258" }, { "cve": "CVE-2019-12259", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12259" }, { "cve": "CVE-2019-12260", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12260" }, { "cve": "CVE-2019-12261", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12261" }, { "cve": "CVE-2019-12262", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12262" }, { "cve": "CVE-2019-12263", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12263" }, { "cve": "CVE-2019-12264", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12264" }, { "cve": "CVE-2019-12265", "notes": [ { "category": "description", "text": "In Wind River VxWorks existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Die Bewertung der Schadensh\u00f6he erfolgt ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Confidentiality\", und \"Availability\" und \"Integrity\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T016945", "T016944", "T031080", "T016943", "T016942", "T015276", "T015110" ] }, "release_date": "2019-07-29T22:00:00.000+00:00", "title": "CVE-2019-12265" } ] }
fkie_cve-2019-12265
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf | Third Party Advisory | |
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf | Third Party Advisory | |
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf | Third Party Advisory | |
cve@mitre.org | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009 | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20190802-0001/ | Third Party Advisory | |
cve@mitre.org | https://support.f5.com/csp/article/K41190253 | Third Party Advisory | |
cve@mitre.org | https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12265 | Vendor Advisory | |
cve@mitre.org | https://support2.windriver.com/index.php?page=security-notices | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190802-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K41190253 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12265 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support2.windriver.com/index.php?page=security-notices | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/ | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
windriver | vxworks | * | |
windriver | vxworks | 7.0 | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | * | |
sonicwall | sonicos | 6.2.7.0 | |
sonicwall | sonicos | 6.2.7.1 | |
sonicwall | sonicos | 6.2.7.7 | |
siemens | siprotec_5_firmware | * | |
siemens | siprotec_5 | - | |
siemens | siprotec_5_firmware | * | |
siemens | siprotec_5 | - | |
siemens | siprotec_5_firmware | * | |
siemens | siprotec_5 | - | |
netapp | e-series_santricity_os_controller | * | |
siemens | power_meter_9410_firmware | * | |
siemens | power_meter_9410 | - | |
siemens | power_meter_9810_firmware | * | |
siemens | power_meter_9810 | - | |
siemens | ruggedcom_win7000_firmware | * | |
siemens | ruggedcom_win7000 | - | |
siemens | ruggedcom_win7018_firmware | * | |
siemens | ruggedcom_win7018 | - | |
siemens | ruggedcom_win7025_firmware | * | |
siemens | ruggedcom_win7025 | - | |
siemens | ruggedcom_win7200_firmware | * | |
siemens | ruggedcom_win7200 | - | |
belden | hirschmann_hios | * | |
belden | hirschmann_ees20 | - | |
belden | hirschmann_ees25 | - | |
belden | hirschmann_eesx20 | - | |
belden | hirschmann_eesx30 | - | |
belden | hirschmann_grs1020 | - | |
belden | hirschmann_grs1030 | - | |
belden | hirschmann_grs1042 | - | |
belden | hirschmann_grs1120 | - | |
belden | hirschmann_grs1130 | - | |
belden | hirschmann_grs1142 | - | |
belden | hirschmann_msp30 | - | |
belden | hirschmann_msp32 | - | |
belden | hirschmann_rail_switch_power_lite | - | |
belden | hirschmann_rail_switch_power_smart | - | |
belden | hirschmann_red25 | - | |
belden | hirschmann_rsp20 | - | |
belden | hirschmann_rsp25 | - | |
belden | hirschmann_rsp30 | - | |
belden | hirschmann_rsp35 | - | |
belden | hirschmann_rspe30 | - | |
belden | hirschmann_rspe32 | - | |
belden | hirschmann_rspe35 | - | |
belden | hirschmann_rspe37 | - | |
belden | hirschmann_hios | * | |
belden | hirschmann_msp40 | - | |
belden | hirschmann_octopus_os3 | - | |
belden | hirschmann_hios | * | |
belden | hirschmann_dragon_mach4000 | - | |
belden | hirschmann_dragon_mach4500 | - | |
belden | hirschmann_hios | * | |
belden | hirschmann_eagle_one | - | |
belden | hirschmann_eagle20 | - | |
belden | hirschmann_eagle30 | - | |
belden | garrettcom_magnum_dx940e_firmware | * | |
belden | garrettcom_magnum_dx940e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "D796397A-5CB0-4BF1-A2FD-8943B15751F8", "versionEndExcluding": "6.9.4.12", "versionStartIncluding": "6.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:windriver:vxworks:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "F3497F9B-A721-4289-A49F-A19D0F7F0148", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "16C417C4-DC9B-48A8-AEAE-755BCC2DA389", "versionEndIncluding": "5.9.0.7", "versionStartIncluding": "5.9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F047B55-4AAB-438D-BBF2-A0BAD4A5AFB2", "versionEndIncluding": "5.9.1.12", "versionStartIncluding": "5.9.1.0.", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "90EA3BDF-084B-4D67-B0EF-4D27CA0EF283", "versionEndIncluding": "6.2.3.1", "versionStartIncluding": "6.2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D59A1A87-D7B3-4F38-A83E-8CBF0A55A476", "versionEndIncluding": "6.2.4.3", "versionStartIncluding": "6.2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "C306A1CA-3A13-4085-A481-25A6B2D2412A", "versionEndIncluding": "6.2.5.3", "versionStartIncluding": "6.2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "819517C6-9288-45B1-96B0-90B05AA5F3C4", "versionEndIncluding": "6.2.6.1", "versionStartIncluding": "6.2.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "31148F5D-C86F-463D-9A5B-9D82515EF901", "versionEndIncluding": "6.2.7.4", "versionStartIncluding": "6.2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "24520D09-E8D2-43BE-A4D3-19FE828A4309", "versionEndIncluding": "6.2.9.2", "versionStartIncluding": "6.2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF416ABF-027E-4571-A81C-36280BFAA1F1", "versionEndIncluding": "6.5.0.3", "versionStartIncluding": "6.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C253EDA-69CE-4C3A-9ABF-A7C55CEFA29C", "versionEndIncluding": "6.5.1.4", "versionStartIncluding": "6.5.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "70C43F8A-0B85-4042-B691-8FDC841A3C2B", "versionEndIncluding": "6.5.2.3", "versionStartIncluding": "6.5.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F26B212-EE89-485A-A414-553C0F39DCA3", "versionEndIncluding": "6.5.3.3", "versionStartIncluding": "6.5.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6BA5213-EA5E-423B-9207-E06AED2917B3", "versionEndIncluding": "6.5.4.3", "versionStartIncluding": "6.5.4.0.", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:6.2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7BC6DEEC-5FB4-4017-B8F0-99A17AD93A52", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:6.2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "DA6DA86B-D7E7-48E6-B841-206B9501DA67", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicos:6.2.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "D0A2A903-3092-40FB-99FE-B864C52D343E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp300", "matchCriteriaId": "00314478-416E-488B-ADBF-DDED873ABE41", "versionEndExcluding": "7.91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E0F0E17-7BE6-40B8-985B-DF2F5F9D2CA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp200", "matchCriteriaId": "E7F2B915-D41F-4D3C-A52D-A63AB729716F", "versionEndExcluding": "7.59", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E0F0E17-7BE6-40B8-985B-DF2F5F9D2CA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp300", "matchCriteriaId": "00314478-416E-488B-ADBF-DDED873ABE41", "versionEndExcluding": "7.91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E0F0E17-7BE6-40B8-985B-DF2F5F9D2CA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E243199-8506-4F65-9C22-2CBD50208F0D", "versionEndIncluding": "8.40.50.00", "versionStartIncluding": "8.00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:power_meter_9410_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9995922-9A9F-45B0-A982-3BC1D92B76D8", "versionEndExcluding": "2.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:power_meter_9410:-:*:*:*:*:*:*:*", "matchCriteriaId": "7900C33F-1C31-4A6F-B98C-EF0A8E64F241", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:power_meter_9810_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCC4AE0-E5A4-4B83-80E3-037FB836A9DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:power_meter_9810:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB5144E0-9082-497E-8958-6B85FDDD6C63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcom_win7000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47C998D1-9DD5-4470-9241-174170541408", "versionEndExcluding": "bs5.2.461.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD6F6C12-9373-48F2-B576-C9AC7A287B53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcom_win7018_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8216AFC1-213B-4E31-8660-5161E08A7C4E", "versionEndExcluding": "bs5.2.461.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcom_win7018:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0F5DBF-4730-40CE-B9CE-DD4DA31D3ED6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcom_win7025_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE5D7B8D-E74F-4839-8839-23894307992D", "versionEndExcluding": "bs5.2.461.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcom_win7025:-:*:*:*:*:*:*:*", "matchCriteriaId": "63967CFD-D35C-4793-858A-032C44E282F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcom_win7200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD25C864-C272-45B7-8EC5-9120DF6A2072", "versionEndExcluding": "bs5.2.461.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7146409-09B7-499C-9544-361B234E952D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "matchCriteriaId": "3950CA89-B400-427C-B6F2-54337AB694E0", "versionEndIncluding": "07.0.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_ees20:-:*:*:*:*:*:*:*", "matchCriteriaId": "D35A90AD-034E-434A-B989-4F871E0AD9A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_ees25:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3EF7BBA-2BCC-4A16-BBEE-E67CE8F95BE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_eesx20:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F453AF-21B0-4611-95D7-88AD821632E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_eesx30:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE6A655D-ED55-4344-9F75-5995371C87C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_grs1020:-:*:*:*:*:*:*:*", "matchCriteriaId": "29576107-85D0-4877-875F-7F60EFDB803D", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_grs1030:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF6200A3-7B4F-4A8E-B9DC-EE6A82093C20", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_grs1042:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBA19D8-8B2D-4AD0-AA77-A3139C33F44D", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_grs1120:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4F7FEA-BB1F-405E-A047-87D0BF0DF054", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_grs1130:-:*:*:*:*:*:*:*", "matchCriteriaId": "641912E2-C368-4438-8D5C-F6615B9FDABC", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_grs1142:-:*:*:*:*:*:*:*", "matchCriteriaId": "F86BB5E8-4499-4E4F-AE5E-1471B297C16F", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_msp30:-:*:*:*:*:*:*:*", "matchCriteriaId": "E89FAE18-5B44-4203-ABFD-BC40AF7E51BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_msp32:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D0DFE2E-2356-46D6-B2D9-89FD907CA168", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE06D94-B686-4468-86CF-AA68BB5CFEF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_smart:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC6487F7-284A-40C2-B70D-9380AD2A47C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_red25:-:*:*:*:*:*:*:*", "matchCriteriaId": "79354FA2-4C48-4506-94BE-7B9ECB18015D", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsp20:-:*:*:*:*:*:*:*", "matchCriteriaId": "DED918F8-041E-4FFC-AFE8-484828696EDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsp25:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ED7974C-BBE6-4BAE-8962-7B5638C7AE20", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsp30:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EE16D46-7BA9-43D4-BB4E-1B638CE6C41B", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_rsp35:-:*:*:*:*:*:*:*", "matchCriteriaId": "165B837A-EF09-489F-BD7C-54107F491BC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_rspe30:-:*:*:*:*:*:*:*", "matchCriteriaId": "C06BF302-8E62-41DB-AA67-6369527B598F", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_rspe32:-:*:*:*:*:*:*:*", "matchCriteriaId": "56D29DAB-C5D6-4539-86E4-43624FB957A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_rspe35:-:*:*:*:*:*:*:*", "matchCriteriaId": "305A9B3E-786C-4F8E-BE36-B4ED84650288", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_rspe37:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CBC8B88-4EC3-4827-B100-3A5A91B29CC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "matchCriteriaId": "2681FAC3-1E59-497A-9931-F4059F84EF86", "versionEndIncluding": "07.5.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_msp40:-:*:*:*:*:*:*:*", "matchCriteriaId": "E92390DF-BFCC-4F30-88A0-33F63CA9B1B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3:-:*:*:*:*:*:*:*", "matchCriteriaId": "A18D078E-1F1A-4DE5-AE43-840D96BE1C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "matchCriteriaId": "98C84F5B-72F6-4059-B634-80EE072D0DF9", "versionEndIncluding": "07.2.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E0562EC-4942-4D14-A634-8A6A5FDB9561", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "79E8B334-8109-4664-8DCC-10876BD702DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFB09BFE-D6C9-4433-A53A-F79608BFACA9", "versionEndIncluding": "05.3.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:hirschmann_eagle_one:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D6D7B3E-90AD-43D9-9192-453A37921E8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_eagle20:-:*:*:*:*:*:*:*", "matchCriteriaId": "771189D9-34F0-400D-938B-2AA218C28C43", "vulnerable": false }, { "criteria": "cpe:2.3:h:belden:hirschmann_eagle30:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DCF228A-F3A8-4B36-A105-04E88980BA76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:belden:garrettcom_magnum_dx940e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE3BDD99-1DFA-4037-8E77-902F39842153", "versionEndIncluding": "1.0.1_y7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:belden:garrettcom_magnum_dx940e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B635F0-96C1-49DA-957C-2ECD55A316C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report." }, { "lang": "es", "value": "Wind River VxWorks versiones 6.5, 6.6, 6.7, 6.8, 6.9.3 y 6.9.4, presenta una P\u00e9rdida de Memoria en el componente cliente IGMPv3. Se presenta una vulnerabilidad de seguridad de IPNET: Un filtrado de informaci\u00f3n de IGMP por medio de un reporte de membres\u00eda espec\u00edfico de IGMPv3." } ], "id": "CVE-2019-12265", "lastModified": "2024-11-21T04:22:31.523", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-09T19:15:11.327", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K41190253" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://support2.windriver.com/index.php?page=security-notices" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K41190253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://support2.windriver.com/index.php?page=security-notices" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cnvd-2019-25707
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/
Name | ['Wind River Systems Wind River Systems VxWorks 6.9', 'Wind River Systems Wind River Systems VxWorks 6.8', 'Wind River Systems Wind River Systems VxWorks 6.7', 'Wind River Systems Wind River Systems VxWorks 6.6'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-12265", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-12265" } }, "description": "Wind River Systems VxWorks\u662f\u7f8e\u56fd\u98ce\u6cb3\u7cfb\u7edf\uff08Wind River Systems\uff09\u516c\u53f8\u7684\u4e00\u5957\u5d4c\u5165\u5f0f\u5b9e\u65f6\u64cd\u4f5c\u7cfb\u7edf\uff08RTOS\uff09\u3002\n\nWind River Systems VxWorks\u4e2d\u5b58\u5728\u53c2\u6570\u6ce8\u5165\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5916\u90e8\u8f93\u5165\u6570\u636e\u6784\u9020\u547d\u4ee4\u53c2\u6570\u7684\u8fc7\u7a0b\u4e2d\uff0c\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u6b63\u786e\u8fc7\u6ee4\u53c2\u6570\u4e2d\u7684\u7279\u6b8a\u5b57\u7b26\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u975e\u6cd5\u547d\u4ee4\u3002", "discovererName": "Armis Labs", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1ahttps://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-25707", "openTime": "2019-08-02", "patchDescription": "Wind River Systems VxWorks\u662f\u7f8e\u56fd\u98ce\u6cb3\u7cfb\u7edf\uff08Wind River Systems\uff09\u516c\u53f8\u7684\u4e00\u5957\u5d4c\u5165\u5f0f\u5b9e\u65f6\u64cd\u4f5c\u7cfb\u7edf\uff08RTOS\uff09\u3002\r\n\r\nWind River Systems VxWorks\u4e2d\u5b58\u5728\u53c2\u6570\u6ce8\u5165\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5916\u90e8\u8f93\u5165\u6570\u636e\u6784\u9020\u547d\u4ee4\u53c2\u6570\u7684\u8fc7\u7a0b\u4e2d\uff0c\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u6b63\u786e\u8fc7\u6ee4\u53c2\u6570\u4e2d\u7684\u7279\u6b8a\u5b57\u7b26\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u975e\u6cd5\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Wind River Systems VxWorks\u53c2\u6570\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2019-25707\uff09\u7684\u8865\u4e01", "products": { "product": [ "Wind River Systems Wind River Systems VxWorks 6.9", "Wind River Systems Wind River Systems VxWorks 6.8", "Wind River Systems Wind River Systems VxWorks 6.7", "Wind River Systems Wind River Systems VxWorks 6.6" ] }, "referenceLink": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "serverity": "\u4e2d", "submitTime": "2019-07-31", "title": "Wind River Systems VxWorks\u53c2\u6570\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2019-25707\uff09" }
var-201908-0706
Vulnerability from variot
Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report. The vulnerability stems from the process of constructing command parameters from external input data. The network system or product does not properly filter the special characters in the parameters. An attacker could exploit the vulnerability to execute an illegal command. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7, Version 6.6. A vulnerability in the IGMPv3 client component of Wind River VxWorks could allow unauthenticated, remote malicious user to access sensitive information on a targeted system.
Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0706", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": "eq", "trust": 2.4, "vendor": "sonicos", "version": "*" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.5.0" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "6.5.0.3" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.6.0" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "6.5.1.4" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "6.5.4.0." }, { "model": "vxworks", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "7.0" }, { "model": "hirschmann hios", "scope": "lte", "trust": 1.0, "vendor": "belden", "version": "07.5.01" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "5.9.0.0" }, { "model": "e-series santricity os controller", "scope": "lte", "trust": 1.0, "vendor": "netapp", "version": "8.40.50.00" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.7.0" }, { "model": "ruggedcom win7000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "bs5.2.461.17" }, { "model": "hirschmann hios", "scope": "lte", "trust": 1.0, "vendor": "belden", "version": "07.2.04" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.7.4" }, { "model": "hirschmann hios", "scope": "lte", "trust": 1.0, "vendor": "belden", "version": "05.3.06" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "5.9.1.0." }, { "model": "ruggedcom win7200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "bs5.2.461.17" }, { "model": "power meter 9810", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "garrettcom magnum dx940e", "scope": "lte", "trust": 1.0, "vendor": "belden", "version": "1.0.1_y7" }, { "model": "siprotec 5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.59" }, { "model": "sonicos", "scope": "eq", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.7.7" }, { "model": "vxworks", "scope": "lt", "trust": 1.0, "vendor": "windriver", "version": "6.9.4.12" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.0.0" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "6.5.2.3" }, { "model": "e-series santricity os controller", "scope": "gte", "trust": 1.0, "vendor": "netapp", "version": "8.00" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "5.9.1.12" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.9.0" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "6.5.1.0" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.9.2" }, { "model": "power meter 9410", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.2.1" }, { "model": "sonicos", "scope": "eq", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.7.0" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.3.1" }, { "model": "sonicos", "scope": "eq", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.7.1" }, { "model": "ruggedcom win7018", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "bs5.2.461.17" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.4.0" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "6.5.3.3" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "6.5.0.0" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.5.3" }, { "model": "vxworks", "scope": "gte", "trust": 1.0, "vendor": "windriver", "version": "6.5" }, { "model": "ruggedcom win7025", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "bs5.2.461.17" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.4.3" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "6.5.2.0" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "6.2.6.1" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "5.9.0.7" }, { "model": "sonicos", "scope": "gte", "trust": 1.0, "vendor": "sonicwall", "version": "6.5.3.0" }, { "model": "siprotec 5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.91" }, { "model": "hirschmann hios", "scope": "lte", "trust": 1.0, "vendor": "belden", "version": "07.0.07" }, { "model": "sonicos", "scope": "lte", "trust": 1.0, "vendor": "sonicwall", "version": "6.5.4.3" }, { "model": "e-series santricity os controller", "scope": null, "trust": 0.8, "vendor": "netapp", "version": null }, { "model": "siprotec 5", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "sonicos", "scope": null, "trust": 0.8, "vendor": "sonicwall", "version": null }, { "model": "vxworks", "scope": null, "trust": 0.8, "vendor": "\u30a6\u30a4\u30f3\u30c9\u30ea\u30d0\u30fc\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "siprotec 5", "version": "*" }, { "model": "river systems wind river systems vxworks", "scope": "eq", "trust": 0.6, "vendor": "wind", "version": "6.9" }, { "model": "river systems wind river systems vxworks", "scope": "eq", "trust": 0.6, "vendor": "wind", "version": "6.8" }, { "model": "river systems wind river systems vxworks", "scope": "eq", "trust": 0.6, "vendor": "wind", "version": "6.7" }, { "model": "river systems wind river systems vxworks", "scope": "eq", "trust": 0.6, "vendor": "wind", "version": "6.6" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.6" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.7" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.8" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.9.3" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.9.4" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "e series santricity os controller", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sonicos", "version": "6.2.7.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sonicos", "version": "6.2.7.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sonicos", "version": "6.2.7.7" } ], "sources": [ { "db": "IVD", "id": "14a30265-6509-41d2-8c7a-3a278582ea2a" }, { "db": "CNVD", "id": "CNVD-2019-25707" }, { "db": "JVNDB", "id": "JVNDB-2019-007852" }, { "db": "NVD", "id": "CVE-2019-12265" } ] }, "cve": "CVE-2019-12265", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-12265", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CNVD-2019-25707", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "14a30265-6509-41d2-8c7a-3a278582ea2a", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-143994", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2019-12265", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2019-12265", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-12265", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-12265", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-25707", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201907-1489", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "14a30265-6509-41d2-8c7a-3a278582ea2a", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-143994", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-12265", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "14a30265-6509-41d2-8c7a-3a278582ea2a" }, { "db": "CNVD", "id": "CNVD-2019-25707" }, { "db": "VULHUB", "id": "VHN-143994" }, { "db": "VULMON", "id": "CVE-2019-12265" }, { "db": "JVNDB", "id": "JVNDB-2019-007852" }, { "db": "CNNVD", "id": "CNNVD-201907-1489" }, { "db": "NVD", "id": "CVE-2019-12265" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report. The vulnerability stems from the process of constructing command parameters from external input data. The network system or product does not properly filter the special characters in the parameters. An attacker could exploit the vulnerability to execute an illegal command. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7, Version 6.6. A vulnerability in the IGMPv3 client component of Wind River VxWorks could allow unauthenticated, remote malicious user to access sensitive information on a targeted system. \n\nProof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available", "sources": [ { "db": "NVD", "id": "CVE-2019-12265" }, { "db": "JVNDB", "id": "JVNDB-2019-007852" }, { "db": "CNVD", "id": "CNVD-2019-25707" }, { "db": "IVD", "id": "14a30265-6509-41d2-8c7a-3a278582ea2a" }, { "db": "VULHUB", "id": "VHN-143994" }, { "db": "VULMON", "id": "CVE-2019-12265" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-12265", "trust": 4.2 }, { "db": "SIEMENS", "id": "SSA-352504", "trust": 1.8 }, { "db": "SIEMENS", "id": "SSA-189842", "trust": 1.8 }, { "db": "SIEMENS", "id": "SSA-632562", "trust": 1.8 }, { "db": "ICS CERT", "id": "ICSA-19-274-01", "trust": 1.4 }, { "db": "ICS CERT", "id": "ICSA-19-211-01", "trust": 1.4 }, { "db": "ICS CERT", "id": "ICSMA-19-274-01", "trust": 1.4 }, { "db": "CNNVD", "id": "CNNVD-201907-1489", "trust": 0.9 }, { "db": "ICS CERT", "id": "ICSA-23-320-10", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-25707", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU92598492", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU92467308", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-007852", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.3695.5", "trust": 0.6 }, { "db": "AUSCERT", "id": "ASB-2019.0224", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3245", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2856", "trust": 0.6 }, { "db": "IVD", "id": "14A30265-6509-41D2-8C7A-3A278582EA2A", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-143994", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-12265", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "14a30265-6509-41d2-8c7a-3a278582ea2a" }, { "db": "CNVD", "id": "CNVD-2019-25707" }, { "db": "VULHUB", "id": "VHN-143994" }, { "db": "VULMON", "id": "CVE-2019-12265" }, { "db": "JVNDB", "id": "JVNDB-2019-007852" }, { "db": "CNNVD", "id": "CNNVD-201907-1489" }, { "db": "NVD", "id": "CVE-2019-12265" } ] }, "id": "VAR-201908-0706", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "14a30265-6509-41d2-8c7a-3a278582ea2a" }, { "db": "CNVD", "id": "CNVD-2019-25707" }, { "db": "VULHUB", "id": "VHN-143994" } ], "trust": 1.4289024700000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "14a30265-6509-41d2-8c7a-3a278582ea2a" }, { "db": "CNVD", "id": "CNVD-2019-25707" } ] }, "last_update_date": "2024-11-23T19:39:29.925000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security\u00a0Notices Siemens Siemens\u00a0Security\u00a0Advisory", "trust": 0.8, "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "title": "Patch for Wind River Systems VxWorks Parameter Injection Vulnerability (CNVD-2019-25707)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/172953" }, { "title": "Wind River Systems VxWorks Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95604" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2019/07/29/wind_river_patches_vxworks/" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1f919286ef48798d96223ef4d2143337" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=2dd69ca01b84b80e09672fedb1c26f51" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=99fa839be73f2df819a67c27caa912f8" }, { "title": "Fortinet Security Advisories: Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-222" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25707" }, { "db": "VULMON", "id": "CVE-2019-12265" }, { "db": "JVNDB", "id": "JVNDB-2019-007852" }, { "db": "CNNVD", "id": "CNNVD-201907-1489" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "resource management issues (CWE-399) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-399", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-143994" }, { "db": "JVNDB", "id": "JVNDB-2019-007852" }, { "db": "NVD", "id": "CVE-2019-12265" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=cve-2019-12265" }, { "trust": 1.8, "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "trust": 1.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "trust": 1.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "trust": 1.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "trust": 1.8, "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0009" }, { "trust": 1.8, "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "trust": 1.8, "url": "https://support.f5.com/csp/article/k41190253" }, { "trust": 1.8, "url": "https://support2.windriver.com/index.php?page=security-notices" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12265" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-274-01" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsma-19-274-01" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-01" }, { "trust": 0.9, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92467308/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92598492/index.html" }, { "trust": 0.6, "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf" }, { "trust": 0.6, "url": "https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks" }, { "trust": 0.6, "url": "https://fortiguard.com/psirt/fg-ir-19-222" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3695.5/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2856/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/asb-2019.0224/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3245/" }, { "trust": 0.1, "url": "https://support2.windriver.com/index.php?page=cve\u0026amp;on=view\u0026amp;id=cve-2019-12265" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/401.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=60689" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25707" }, { "db": "VULHUB", "id": "VHN-143994" }, { "db": "VULMON", "id": "CVE-2019-12265" }, { "db": "JVNDB", "id": "JVNDB-2019-007852" }, { "db": "CNNVD", "id": "CNNVD-201907-1489" }, { "db": "NVD", "id": "CVE-2019-12265" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "14a30265-6509-41d2-8c7a-3a278582ea2a" }, { "db": "CNVD", "id": "CNVD-2019-25707" }, { "db": "VULHUB", "id": "VHN-143994" }, { "db": "VULMON", "id": "CVE-2019-12265" }, { "db": "JVNDB", "id": "JVNDB-2019-007852" }, { "db": "CNNVD", "id": "CNNVD-201907-1489" }, { "db": "NVD", "id": "CVE-2019-12265" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "IVD", "id": "14a30265-6509-41d2-8c7a-3a278582ea2a" }, { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25707" }, { "date": "2019-08-09T00:00:00", "db": "VULHUB", "id": "VHN-143994" }, { "date": "2019-08-09T00:00:00", "db": "VULMON", "id": "CVE-2019-12265" }, { "date": "2019-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-007852" }, { "date": "2019-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-1489" }, { "date": "2019-08-09T19:15:11.327000", "db": "NVD", "id": "CVE-2019-12265" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25707" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-143994" }, { "date": "2022-08-12T00:00:00", "db": "VULMON", "id": "CVE-2019-12265" }, { "date": "2023-11-21T01:26:00", "db": "JVNDB", "id": "JVNDB-2019-007852" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-1489" }, { "date": "2024-11-21T04:22:31.523000", "db": "NVD", "id": "CVE-2019-12265" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-1489" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wind\u00a0River\u00a0VxWorks\u00a0 Vulnerabilities related to resource management in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-007852" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Resource management error", "sources": [ { "db": "IVD", "id": "14a30265-6509-41d2-8c7a-3a278582ea2a" }, { "db": "CNNVD", "id": "CNNVD-201907-1489" } ], "trust": 0.8 } }
gsd-2019-12265
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-12265", "description": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report.", "id": "GSD-2019-12265" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-12265" ], "details": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report.", "id": "GSD-2019-12265", "modified": "2023-12-13T01:23:43.661568Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12265", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support2.windriver.com/index.php?page=security-notices", "refsource": "MISC", "url": "https://support2.windriver.com/index.php?page=security-notices" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009", "refsource": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "name": "https://security.netapp.com/advisory/ntap-20190802-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "name": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "refsource": "CONFIRM", "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "name": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265", "refsource": "CONFIRM", "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265" }, { "name": "https://support.f5.com/csp/article/K41190253", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K41190253" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:windriver:vxworks:7.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.9.4.12", "versionStartIncluding": "6.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.5.4.3", "versionStartIncluding": "6.5.4.0.", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.5.3.3", "versionStartIncluding": "6.5.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.5.2.3", "versionStartIncluding": "6.5.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.5.1.4", "versionStartIncluding": "6.5.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.5.0.3", "versionStartIncluding": "6.5.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.7.4", "versionStartIncluding": "6.2.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.6.1", "versionStartIncluding": "6.2.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.5.3", "versionStartIncluding": "6.2.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.4.3", "versionStartIncluding": "6.2.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.3.1", "versionStartIncluding": "6.2.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.9.1.12", "versionStartIncluding": "5.9.1.0.", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.9.0.7", "versionStartIncluding": "5.9.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:6.2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:6.2.7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:6.2.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.9.2", "versionStartIncluding": "6.2.9.0", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp300", "cpe_name": [], "versionEndExcluding": "7.91", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp200", "cpe_name": [], "versionEndExcluding": "7.59", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp300", "cpe_name": [], "versionEndExcluding": "7.91", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.40.50.00", "versionStartIncluding": "8.00", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:power_meter_9410_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:power_meter_9410:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:power_meter_9810_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:power_meter_9810:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_win7000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "bs5.2.461.17", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_win7018_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "bs5.2.461.17", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win7018:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_win7025_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "bs5.2.461.17", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win7025:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_win7200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "bs5.2.461.17", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07.0.07", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rail_switch_power_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rail_switch_power_smart:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_red25:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_grs1042:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_grs1142:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_grs1020:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_grs1120:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_grs1030:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_grs1130:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_eesx20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_eesx30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ees20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_ees25:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_msp30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_msp32:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rspe30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rspe32:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rspe35:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rspe37:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsp25:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsp30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsp35:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_rsp20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07.5.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_octopus_os3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_msp40:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07.2.04", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_dragon_mach4000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_dragon_mach4500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "05.3.06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_eagle20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_eagle30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:belden:hirschmann_eagle_one:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:belden:garrettcom_magnum_dx940e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.1_y7", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belden:garrettcom_magnum_dx940e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12265" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-401" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009" }, { "name": "https://support2.windriver.com/index.php?page=security-notices", "refsource": "MISC", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://support2.windriver.com/index.php?page=security-notices" }, { "name": "https://security.netapp.com/advisory/ntap-20190802-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/" }, { "name": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" }, { "name": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12265" }, { "name": "https://support.f5.com/csp/article/K41190253", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K41190253" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2022-08-12T18:44Z", "publishedDate": "2019-08-09T19:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.