Wind River VxWorks (Update A)
Wind River VxWorks TCP/IP stack (IPNET) contains multiple memory corruption vulnerabilities (buffer overflow, stack overflow, integer underflow, race condition, command injection) in versions 6.5 through 6.9.4.11 and Vx7 SR540/SR610. An attacker can send malicious TCP/IP packets to trigger these flaws and execute arbitrary code remotely. The vulnerabilities exist in the core TCP/IP stack used across VxWorks deployments, bootrom network stack, and Advanced Networking Technology (ANT). Affected products include controllers from Rockwell Automation, Xerox multifunction devices, Dräger medical/industrial equipment, and Schneider Electric industrial automation systems.
- Network connectivity to a device running vulnerable VxWorks version
- No authentication or credentials required
- Device must have TCP/IP stack enabled and reachable from attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9fe4e346-da75-4b9b-959f-9cac27e089d7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.