Interpeak IPnet TCP/IP Stack (Update E)
Interpeak IPnet TCP/IP stack contains multiple buffer overflow (CWE-121, CWE-122), integer underflow (CWE-191), and memory safety vulnerabilities (CWE-119, CWE-362, CWE-88, CWE-476) that allow remote code execution. The stack is embedded in VxWorks RTOS (versions 6.5 through current SR releases), Enea OSE (versions 4 and 5), Enea INTEGRITY RTOS (2003–2006), and Advanced Networking Technology (ANT). A remote attacker can send a specially crafted network packet to trigger memory corruption and execute arbitrary code at kernel level. Affected products include industrial control systems from Siemens, Rockwell Automation, Mitsubishi Electric, ABB, Schneider Electric, Woodward, and many others that bundle VxWorks or OSE with Interpeak IPnet.
- Network reachability to any port on devices running affected stack (VxWorks 6.5+, OSE4/OSE5, INTEGRITY RTOS 2003-2006, ANT, or Interpeak IPnet directly)
- No authentication required for exploit
- Attacker need only send crafted network packets
/api/v1/advisories/ed5ce990-d55e-4f34-b273-25b56d322d8fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.