5.8 Medium
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
AI Score
Confidence
High
0.93 High
EPSS
Percentile
99.1%
Wind River VxWorks 6.6 through 6.9 has a Buffer Overflow in the DHCP client component. There is an IPNET security vulnerability: Heap overflow in DHCP Offer/ACK parsing inside ipdhcpc.
CPE | Name | Operator | Version |
---|---|---|---|
windriver:vxworks | windriver vxworks | lt | 6.9.4 |
cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf
cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf
psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009
security.netapp.com/advisory/ntap-20190802-0001/
support.f5.com/csp/article/K41190253
support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12257
support2.windriver.com/index.php?page=security-notices
www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/
More
5.8 Medium
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
AI Score
Confidence
High
0.93 High
EPSS
Percentile
99.1%