Wind River VxWorks Vulnerabilities (URGENT/11)
Wind River VxWorks TCP/IP stack contains critical vulnerabilities (URGENT/11 group) that affect numerous Schneider Electric industrial control products. These vulnerabilities allow remote code execution on affected devices over TCP/IP networks. The vulnerabilities stem from flaws in VxWorks' network stack implementation and impact PLCs (Modicon M580, M241, M251, M262, MC80, Momentum), RTU controllers (SCADAPack, Nanodac, SCD6000, Tricon), protective relays (Easergy series), human-machine interfaces (Magelis, Pro-face), and network infrastructure (ConneXium firewalls). Many products do not have patches available, particularly older or end-of-life product lines. Schneider Electric is working to remediate current and future products and recommends implementing network segmentation, firewall restrictions, and physical access controls for at-risk systems.
- Network access to the device's IP address and listening TCP/IP port
- Device must be running vulnerable VxWorks version (no authentication required)
- Device must be on a network segment reachable from attacker (not air-gapped)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0f9c493e-e330-4743-8b68-9d002e330d73