Wind River VXWorks TCP Predictability Vulnerability in ICS Devices (Update B)
The vulnerability is a weak TCP sequence number generation flaw in Wind River VxWorks that allows remote attackers to predict TCP sequence numbers and inject spoofed packets into network communications. The flaw affects multiple versions of VxWorks (6.7.x through 7.x and earlier variants) and all versions of Schneider Electric SAGE RTU models that run VxWorks. This enables TCP/IP traffic spoofing and session hijacking attacks. Affected SAGE RTU models include 1210, 1230, 1250, 1310, 1330, 1350, 1410, 1430, 1450, 2200, 2300, 2400, 3030, 3030 Magnum, and LANDAC2 upgrade kit. Schneider Electric released a patch for the C3414 LX-800 CPU card (Firmware J2), but most SAGE RTU models lack available patches and require direct contact with the vendor for mitigations.
- Network access to the SAGE RTU (local network or routable path)
- Ability to capture and analyze TCP traffic from the RTU
- RTU with weak or no TCP sequence number randomization enabled
- Optional: security features disabled or default credentials in use
Patching may require device reboot — plan for process interruption
/api/v1/advisories/36066743-d8d2-4d9b-bab7-205757dae954