fkie_cve-2019-12262
Vulnerability from fkie_nvd
Published
2019-08-14 20:15
Modified
2024-11-21 04:22
Severity ?
Summary
Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and 7 has Incorrect Access Control in the RARP client component. IPNET security vulnerability: Handling of unsolicited Reverse ARP replies (Logical Flaw).
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3219535A-64F3-4106-8652-7DD72808AC3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D930A712-C6C8-4251-8FB5-78E65DF2DFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3F36DA7F-6593-4327-A104-2F8829F2ED32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01004955-97D1-4F7E-80D4-4B1509945FBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4810B35-06F6-4971-BE87-A30B1CF58AA0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3950CA89-B400-427C-B6F2-54337AB694E0",
"versionEndIncluding": "07.0.07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_ees20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D35A90AD-034E-434A-B989-4F871E0AD9A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_ees25:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EF7BBA-2BCC-4A16-BBEE-E67CE8F95BE4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_eesx20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F453AF-21B0-4611-95D7-88AD821632E8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_eesx30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE6A655D-ED55-4344-9F75-5995371C87C3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29576107-85D0-4877-875F-7F60EFDB803D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6200A3-7B4F-4A8E-B9DC-EE6A82093C20",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1042:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEBA19D8-8B2D-4AD0-AA77-A3139C33F44D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4F7FEA-BB1F-405E-A047-87D0BF0DF054",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "641912E2-C368-4438-8D5C-F6615B9FDABC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1142:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F86BB5E8-4499-4E4F-AE5E-1471B297C16F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_msp30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E89FAE18-5B44-4203-ABFD-BC40AF7E51BE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_msp32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0DFE2E-2356-46D6-B2D9-89FD907CA168",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_lite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE06D94-B686-4468-86CF-AA68BB5CFEF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_smart:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6487F7-284A-40C2-B70D-9380AD2A47C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_red25:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79354FA2-4C48-4506-94BE-7B9ECB18015D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsp20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DED918F8-041E-4FFC-AFE8-484828696EDB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsp25:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4ED7974C-BBE6-4BAE-8962-7B5638C7AE20",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsp30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE16D46-7BA9-43D4-BB4E-1B638CE6C41B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsp35:-:*:*:*:*:*:*:*",
"matchCriteriaId": "165B837A-EF09-489F-BD7C-54107F491BC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rspe30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C06BF302-8E62-41DB-AA67-6369527B598F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rspe32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56D29DAB-C5D6-4539-86E4-43624FB957A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rspe35:-:*:*:*:*:*:*:*",
"matchCriteriaId": "305A9B3E-786C-4F8E-BE36-B4ED84650288",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rspe37:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CBC8B88-4EC3-4827-B100-3A5A91B29CC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2681FAC3-1E59-497A-9931-F4059F84EF86",
"versionEndIncluding": "07.5.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_msp40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E92390DF-BFCC-4F30-88A0-33F63CA9B1B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A18D078E-1F1A-4DE5-AE43-840D96BE1C6C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98C84F5B-72F6-4059-B634-80EE072D0DF9",
"versionEndIncluding": "07.2.04",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E0562EC-4942-4D14-A634-8A6A5FDB9561",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79E8B334-8109-4664-8DCC-10876BD702DC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB09BFE-D6C9-4433-A53A-F79608BFACA9",
"versionEndIncluding": "05.3.06",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_eagle_one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6D7B3E-90AD-43D9-9192-453A37921E8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_eagle20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "771189D9-34F0-400D-938B-2AA218C28C43",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_eagle30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DCF228A-F3A8-4B36-A105-04E88980BA76",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:belden:garrettcom_magnum_dx940e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE3BDD99-1DFA-4037-8E77-902F39842153",
"versionEndIncluding": "1.0.1_y7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:garrettcom_magnum_dx940e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B635F0-96C1-49DA-957C-2ECD55A316C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:ruggedcom_win7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47C998D1-9DD5-4470-9241-174170541408",
"versionEndExcluding": "bs5.2.461.17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD6F6C12-9373-48F2-B576-C9AC7A287B53",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:ruggedcom_win7018_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8216AFC1-213B-4E31-8660-5161E08A7C4E",
"versionEndExcluding": "bs5.2.461.17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:ruggedcom_win7018:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0F5DBF-4730-40CE-B9CE-DD4DA31D3ED6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:ruggedcom_win7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE5D7B8D-E74F-4839-8839-23894307992D",
"versionEndExcluding": "bs5.2.461.17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:ruggedcom_win7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63967CFD-D35C-4793-858A-032C44E282F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:ruggedcom_win7200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD25C864-C272-45B7-8EC5-9120DF6A2072",
"versionEndExcluding": "bs5.2.461.17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7146409-09B7-499C-9544-361B234E952D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and 7 has Incorrect Access Control in the RARP client component. IPNET security vulnerability: Handling of unsolicited Reverse ARP replies (Logical Flaw)."
},
{
"lang": "es",
"value": "Wind River VxWorks versiones 6.6, 6.7, 6.8, 6.9 y 7, presenta un Control de Acceso Incorrecto en el componente cliente RARP. Vulnerabilidad de seguridad IPNET: Manejo de respuestas Reverse ARP no solicitadas (Fallo L\u00f3gico)."
}
],
"id": "CVE-2019-12262",
"lastModified": "2024-11-21T04:22:30.967",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-08-14T20:15:11.573",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K41190253"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12262"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K41190253"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12262"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…