fkie_cve-2019-12262
Vulnerability from fkie_nvd
Published
2019-08-14 20:15
Modified
2024-11-21 04:22
Severity ?
Summary
Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and 7 has Incorrect Access Control in the RARP client component. IPNET security vulnerability: Handling of unsolicited Reverse ARP replies (Logical Flaw).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:windriver:vxworks:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3219535A-64F3-4106-8652-7DD72808AC3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:windriver:vxworks:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D930A712-C6C8-4251-8FB5-78E65DF2DFBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:windriver:vxworks:6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F36DA7F-6593-4327-A104-2F8829F2ED32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:windriver:vxworks:6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "01004955-97D1-4F7E-80D4-4B1509945FBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:windriver:vxworks:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4810B35-06F6-4971-BE87-A30B1CF58AA0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3950CA89-B400-427C-B6F2-54337AB694E0",
              "versionEndIncluding": "07.0.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_ees20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D35A90AD-034E-434A-B989-4F871E0AD9A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_ees25:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EF7BBA-2BCC-4A16-BBEE-E67CE8F95BE4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_eesx20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F453AF-21B0-4611-95D7-88AD821632E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_eesx30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE6A655D-ED55-4344-9F75-5995371C87C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29576107-85D0-4877-875F-7F60EFDB803D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF6200A3-7B4F-4A8E-B9DC-EE6A82093C20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1042:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBA19D8-8B2D-4AD0-AA77-A3139C33F44D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4F7FEA-BB1F-405E-A047-87D0BF0DF054",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "641912E2-C368-4438-8D5C-F6615B9FDABC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1142:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F86BB5E8-4499-4E4F-AE5E-1471B297C16F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_msp30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E89FAE18-5B44-4203-ABFD-BC40AF7E51BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_msp32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0DFE2E-2356-46D6-B2D9-89FD907CA168",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE06D94-B686-4468-86CF-AA68BB5CFEF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_smart:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC6487F7-284A-40C2-B70D-9380AD2A47C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_red25:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79354FA2-4C48-4506-94BE-7B9ECB18015D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rsp20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED918F8-041E-4FFC-AFE8-484828696EDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rsp25:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED7974C-BBE6-4BAE-8962-7B5638C7AE20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rsp30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE16D46-7BA9-43D4-BB4E-1B638CE6C41B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rsp35:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "165B837A-EF09-489F-BD7C-54107F491BC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rspe30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06BF302-8E62-41DB-AA67-6369527B598F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rspe32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56D29DAB-C5D6-4539-86E4-43624FB957A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rspe35:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "305A9B3E-786C-4F8E-BE36-B4ED84650288",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rspe37:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CBC8B88-4EC3-4827-B100-3A5A91B29CC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2681FAC3-1E59-497A-9931-F4059F84EF86",
              "versionEndIncluding": "07.5.01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_msp40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E92390DF-BFCC-4F30-88A0-33F63CA9B1B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A18D078E-1F1A-4DE5-AE43-840D96BE1C6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C84F5B-72F6-4059-B634-80EE072D0DF9",
              "versionEndIncluding": "07.2.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E0562EC-4942-4D14-A634-8A6A5FDB9561",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79E8B334-8109-4664-8DCC-10876BD702DC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB09BFE-D6C9-4433-A53A-F79608BFACA9",
              "versionEndIncluding": "05.3.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_eagle_one:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D6D7B3E-90AD-43D9-9192-453A37921E8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_eagle20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "771189D9-34F0-400D-938B-2AA218C28C43",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_eagle30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DCF228A-F3A8-4B36-A105-04E88980BA76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:belden:garrettcom_magnum_dx940e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE3BDD99-1DFA-4037-8E77-902F39842153",
              "versionEndIncluding": "1.0.1_y7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:belden:garrettcom_magnum_dx940e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B635F0-96C1-49DA-957C-2ECD55A316C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:ruggedcom_win7000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47C998D1-9DD5-4470-9241-174170541408",
              "versionEndExcluding": "bs5.2.461.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD6F6C12-9373-48F2-B576-C9AC7A287B53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:ruggedcom_win7018_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8216AFC1-213B-4E31-8660-5161E08A7C4E",
              "versionEndExcluding": "bs5.2.461.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:ruggedcom_win7018:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0F5DBF-4730-40CE-B9CE-DD4DA31D3ED6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:ruggedcom_win7025_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5D7B8D-E74F-4839-8839-23894307992D",
              "versionEndExcluding": "bs5.2.461.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:ruggedcom_win7025:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63967CFD-D35C-4793-858A-032C44E282F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:ruggedcom_win7200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD25C864-C272-45B7-8EC5-9120DF6A2072",
              "versionEndExcluding": "bs5.2.461.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7146409-09B7-499C-9544-361B234E952D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and 7 has Incorrect Access Control in the RARP client component. IPNET security vulnerability: Handling of unsolicited Reverse ARP replies (Logical Flaw)."
    },
    {
      "lang": "es",
      "value": "Wind River VxWorks versiones 6.6, 6.7, 6.8, 6.9 y 7, presenta un Control de Acceso Incorrecto en el componente cliente RARP. Vulnerabilidad de seguridad IPNET: Manejo de respuestas Reverse ARP no solicitadas (Fallo L\u00f3gico)."
    }
  ],
  "id": "CVE-2019-12262",
  "lastModified": "2024-11-21T04:22:30.967",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-08-14T20:15:11.573",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.f5.com/csp/article/K41190253"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12262"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.f5.com/csp/article/K41190253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12262"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.