CVE-2019-12263:
Wind River VxWorks IPNET TCP stack vulnerability CVE-2019-12263: a buffer overflow in the TCP component caused by a race condition leading to TCP Urgent Pointer state confusion in 6.9.4 and vx7.
Score
A numerical rating that indicates how dangerous this vulnerability is.
8.1HighA numerical rating that indicates how dangerous this vulnerability is.
- Published Date:Aug 9, 2019
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:0.5
- EPSS Percentile:68%
Exploitability
- Score:2.2
- Attack Vector:NETWORK
- Attack Complexity:HIGH
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Wind River VxWorks IPNET TCP stack vulnerability CVE-2019-12263: a buffer overflow in the TCP component caused by a race condition leading to TCP Urgent Pointer state confusion in 6.9.4 and vx7.
Overview
This CVE documents a buffer overflow in Wind River VxWorks' IPNET TCP/IP stack (TCP component) caused by a race condition that leads to TCP Urgent Pointer state confusion, affecting 6.9.4 and vx7 deployments.
Remediation
- Identify affected systems running Wind River VxWorks 6.9.4 or vx7 with the IPNET TCP/IP stack.
- Apply the vendor-supplied patch or upgrade to a fixed IPNET/TCP stack version as provided in Wind River advisories for CVE-2019-12263.
- If a patch is not immediately available, implement compensating controls:
- Place affected devices behind firewalls or network segmentation to limit exposure to TCP traffic from untrusted sources.
- Restrict or monitor TCP traffic to and from affected devices; disable unnecessary TCP services.
- Implement strict access controls and IDS/IPS monitoring for abnormal TCP URGENT pointer usage.
- Validate remediation by confirming patch application and re-testing TCP handling; monitor vendor advisories for new updates.
References
- - https://support2.windriver.com/index.php?page=security-notices
- - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009
- - https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf
- - https://security.netapp.com/advisory/ntap-20190802-0001/
- - https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/
- - https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12263
- - https://support.f5.com/csp/article/K41190253
- - https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf
- - https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.
Medium
Low