Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
9.8CRITICALNVD
EPSS
79.5%
top 0.91%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 9
Latest updateMay 24

Description

Wind River VxWorks has a Buffer Overflow in the TCP component (issue 1 of 4). This is a IPNET security vulnerability: TCP Urgent Pointer = 0 that leads to an integer underflow.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages11 packages

🔴Vulnerability Details

3
GHSA
GHSA-h297-57pm-6g4c: Wind River VxWorks 62022-05-24
CVEList
CVE-2019-12255: Wind River VxWorks has a Buffer Overflow in the TCP component (issue 1 of 4)2019-08-09
VulnCheck
windriver vxworks Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')2019

💥Exploits & PoCs

1
Exploit-DB
VxWorks 6.8 - TCP Urgent Pointer = 0 Integer Underflow2019-08-12
CVE-2019-12255 — Classic Buffer Overflow in Vxworks | cvebase