Interpeak IPnet TCP/IP Stack (Update D)
Multiple critical vulnerabilities (CVE-2019-12255, CVE-2019-12262, CVE-2019-12264, CVE-2019-12256) have been identified in the Interpeak IPnet TCP/IP stack, which is bundled in or integrated with OSE (ENEA), INTEGRITY RTOS (Green Hills Software), ZebOS (IP Infusion), VxWorks (Wind River), and some ITRON implementations. The vulnerabilities include buffer overflows (CWE-121, CWE-122), integer underflows (CWE-191), and integer overflow conditions (CWE-119) that can be triggered by remote, unauthenticated attackers via specially crafted network packets. Affected versions range from all versions of products that shipped with Interpeak IPnet to end-of-life versions (VxWorks <= 6.5). VxWorks bootrom network stack is also affected, though exploitation may be more difficult due to static IP configuration and lack of TCP port listeners. Successful exploitation allows remote code execution with potential for complete system compromise.
- Network connectivity to the affected device on any open port
- No authentication required
- Device must be running one of the affected RTOS platforms with Interpeak IPnet bundled or integrated
/api/v1/advisories/5e11647a-2c4b-436f-88c3-d4c54921c933