var-201508-0391
Vulnerability from variot
Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x before 6.9.4.4, and 7.x before 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value. VxWorks is a real-time operating system widely used on ICS-related devices. Schneider Electric SAGE RTU is a series of industrial data communication equipment of French Schneider Electric (Schneider Electric). Wind River VxWorks is a set of embedded real-time operating systems (RTOS) developed by Wind River in the United States.
A security vulnerability exists in Wind River VxWorks used in previous versions of Schneider Electric SAGE RTU equipment J2. The following versions are affected: Wind River VxWorks before 5.5.1, 6.5.x, 6.6.x, 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, and 6.9 before 6.9.4.4. x version, 7.x version before 7 ipnet_coreip 1.2.2.0. An attacker can exploit this issue to gain access to sensitive information, to cause a denial-of-service condition and perform certain unauthorized actions; this may lead to further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201508-0391", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vxworks", "scope": "lte", "trust": 1.0, "vendor": "windriver", "version": "6.6" }, { "model": "vxworks", "scope": "gte", "trust": 1.0, "vendor": "windriver", "version": "6.7" }, { "model": "vxworks", "scope": "lt", "trust": 1.0, "vendor": "windriver", "version": "6.8.3" }, { "model": "vxworks", "scope": "lt", "trust": 1.0, "vendor": "windriver", "version": "6.7.1.1" }, { "model": "vxworks", "scope": "lt", "trust": 1.0, "vendor": "windriver", "version": "6.9.4.4" }, { "model": "vxworks", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "6.6.4" }, { "model": "vxworks", "scope": "gte", "trust": 1.0, "vendor": "windriver", "version": "6.5" }, { "model": "vxworks", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "6.6.4.1" }, { "model": "vxworks", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "6.6.3" }, { "model": "vxworks", "scope": "gte", "trust": 1.0, "vendor": "windriver", "version": "6.9" }, { "model": "vxworks", "scope": "gte", "trust": 1.0, "vendor": "windriver", "version": "6.8" }, { "model": "vxworks", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "7.0" }, { "model": "vxworks", "scope": "eq", "trust": 0.9, "vendor": "windriver", "version": "6.9" }, { "model": "vxworks", "scope": "eq", "trust": 0.9, "vendor": "windriver", "version": "6.8" }, { "model": "vxworks", "scope": "eq", "trust": 0.9, "vendor": "windriver", "version": "6.7" }, { "model": "vxworks", "scope": "eq", "trust": 0.9, "vendor": "windriver", "version": "6.6" }, { "model": "sage 1230 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "vxworks", "scope": "lt", "trust": 0.8, "vendor": "wind river", "version": "6.7.x" }, { "model": "sage 1350 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "sage 1410 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "sage 1330 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "sage 1310 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "vxworks", "scope": "eq", "trust": 0.8, "vendor": "wind river", "version": "6.9.4.4" }, { "model": "vxworks", "scope": "lt", "trust": 0.8, "vendor": "wind river", "version": "7.x" }, { "model": "sage 2400 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "vxworks", "scope": "lt", "trust": 0.8, "vendor": "wind river", "version": "6.9.x" }, { "model": "sage 1250 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "vxworks", "scope": "eq", "trust": 0.8, "vendor": "wind river", "version": "7 ipnet_coreip 1.2.2.0" }, { "model": "sage 1210 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "vxworks", "scope": "eq", "trust": 0.8, "vendor": "wind river", "version": "6.5.x from 6.7.1.1" }, { "model": "sage 3030 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "sage 1430 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "sage 2200 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "vxworks", "scope": "lt", "trust": 0.8, "vendor": "wind river", "version": "6.8.x" }, { "model": "sage 1450 rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "sage 3030 magnum rtu", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "vxworks", "scope": "eq", "trust": 0.8, "vendor": "wind river", "version": "6.8.3" }, { "model": "river systems vxworks", "scope": "eq", "trust": 0.6, "vendor": "wind", "version": "6.x" }, { "model": "river systems vxworks", "scope": "eq", "trust": 0.6, "vendor": "wind", "version": "7.x" }, { "model": "vxworks", "scope": "eq", "trust": 0.6, "vendor": "windriver", "version": "6.9.4" }, { "model": "vxworks", "scope": "eq", "trust": 0.6, "vendor": "windriver", "version": "5.5" }, { "model": "vxworks", "scope": "eq", "trust": 0.6, "vendor": "windriver", "version": "6.5" }, { "model": "vxworks", "scope": "eq", "trust": 0.6, "vendor": "windriver", "version": "6.9.3" }, { "model": "phaser 3635mfp", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "0" }, { "model": "vxworks", "scope": "eq", "trust": 0.3, "vendor": "windriver", "version": "7" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "30300" }, { "model": "sage magnum rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "30300" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "24000" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "22000" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "14500" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "14300" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "14100" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "13500" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "13300" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "13100" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "12500" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "12300" }, { "model": "sage rtu", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "12100" }, { "model": "rtu500 series", "scope": "eq", "trust": 0.3, "vendor": "abb", "version": "11.3" }, { "model": "phaser 3635mfp", "scope": "ne", "trust": 0.3, "vendor": "xerox", "version": "20.105.54.000" }, { "model": "vxworks", "scope": "ne", "trust": 0.3, "vendor": "windriver", "version": "6.8.3" }, { "model": "vxworks", "scope": "ne", "trust": 0.3, "vendor": "windriver", "version": "5.5.1" }, { "model": "vxworks", "scope": "ne", "trust": 0.3, "vendor": "windriver", "version": "6.9.4.4" }, { "model": "vxworks", "scope": "ne", "trust": 0.3, "vendor": "windriver", "version": "6.7.1.1" }, { "model": "vxworks", "scope": "ne", "trust": 0.3, "vendor": "windriver", "version": "6.4" }, { "model": "vxworks", "scope": "ne", "trust": 0.3, "vendor": "windriver", "version": "6.0" }, { "model": "sage magnum rtu c3414-500-s02j2", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "3030" }, { "model": "sage rtu c3414-500-s02j2", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "2400" }, { "model": "sage rtu c3414-500-s02j2", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "1450" }, { "model": "sage rtu c3414-500-s02j2", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "1430" }, { "model": "sage rtu c3414-500-s02j2", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "1410" }, { "model": "rtu500 series", "scope": "ne", "trust": 0.3, "vendor": "abb", "version": "11.4.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.6" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.7" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.8" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.9" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.9.3" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vxworks", "version": "6.9.4" } ], "sources": [ { "db": "IVD", "id": "80541190-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-03907" }, { "db": "BID", "id": "75302" }, { "db": "JVNDB", "id": "JVNDB-2015-004019" }, { "db": "NVD", "id": "CVE-2015-3963" }, { "db": "CNNVD", "id": "CNNVD-201507-324" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.6", "versionStartIncluding": "6.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:windriver:vxworks:6.6.3:*:*:*:cert:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:windriver:vxworks:6.6.4:*:*:*:cert:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:windriver:vxworks:6.6.4.1:*:*:*:cert:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.7.1.1", "versionStartIncluding": "6.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.8.3", "versionStartIncluding": "6.8", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.9.4.4", "versionStartIncluding": "6.9", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:windriver:vxworks:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_1210:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_1230:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_1250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_1310:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_1330:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_1350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_1410:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_1430:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_1450:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_2200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_2400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_3030:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:schneider-electric:sage_3030_magnum:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-3963" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "David Formby, and San Shin Jung of Georgia Tech.,Raheem Beyah", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-324" } ], "trust": 0.6 }, "cve": "CVE-2015-3963", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-3963", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2015-03907", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "80541190-2351-11e6-abef-000c29c66e3d", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-81924", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-3963", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-03907", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201507-324", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "80541190-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-81924", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "80541190-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-03907" }, { "db": "VULHUB", "id": "VHN-81924" }, { "db": "JVNDB", "id": "JVNDB-2015-004019" }, { "db": "NVD", "id": "CVE-2015-3963" }, { "db": "CNNVD", "id": "CNNVD-201507-324" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x before 6.9.4.4, and 7.x before 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value. VxWorks is a real-time operating system widely used on ICS-related devices. Schneider Electric SAGE RTU is a series of industrial data communication equipment of French Schneider Electric (Schneider Electric). Wind River VxWorks is a set of embedded real-time operating systems (RTOS) developed by Wind River in the United States. \n\nA security vulnerability exists in Wind River VxWorks used in previous versions of Schneider Electric SAGE RTU equipment J2. The following versions are affected: Wind River VxWorks before 5.5.1, 6.5.x, 6.6.x, 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, and 6.9 before 6.9.4.4. x version, 7.x version before 7 ipnet_coreip 1.2.2.0. \nAn attacker can exploit this issue to gain access to sensitive information, to cause a denial-of-service condition and perform certain unauthorized actions; this may lead to further attacks", "sources": [ { "db": "NVD", "id": "CVE-2015-3963" }, { "db": "JVNDB", "id": "JVNDB-2015-004019" }, { "db": "CNVD", "id": "CNVD-2015-03907" }, { "db": "CNNVD", "id": "CNNVD-201507-324" }, { "db": "BID", "id": "75302" }, { "db": "IVD", "id": "80541190-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-81924" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-3963", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-15-169-01", "trust": 3.4 }, { "db": "BID", "id": "75302", "trust": 2.6 }, { "db": "SCHNEIDER", "id": "SEVD-2015-162-01", "trust": 1.7 }, { "db": "SECTRACK", "id": "1033181", "trust": 1.7 }, { "db": "SECTRACK", "id": "1032730", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-15-169-01A", "trust": 1.7 }, { "db": "CNVD", "id": "CNVD-2015-03907", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201507-324", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-004019", "trust": 0.8 }, { "db": "IVD", "id": "80541190-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-81924", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "80541190-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-03907" }, { "db": "VULHUB", "id": "VHN-81924" }, { "db": "BID", "id": "75302" }, { "db": "JVNDB", "id": "JVNDB-2015-004019" }, { "db": "NVD", "id": "CVE-2015-3963" }, { "db": "CNNVD", "id": "CNNVD-201507-324" } ] }, "id": "VAR-201508-0391", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "80541190-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-03907" }, { "db": "VULHUB", "id": "VHN-81924" } ], "trust": 1.30669191 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT", "ICS" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "80541190-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-03907" } ] }, "last_update_date": "2023-12-18T11:00:45.492000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAGE RTU VxWorks TCP Predictability", "trust": 0.8, "url": "http://download.schneider-electric.com/files?p_reference=sevd-2015-162-01\u0026p_endoctype=brochure\u0026p_file_id=868067338\u0026p_file_name=sevd-2015-162-01.pdf" }, { "title": "SEVD-2015-162-01", "trust": 0.8, "url": "http://www.schneider-electric.com/ww/en/download/document/sevd-2015-162-01" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.windriver.com/" }, { "title": "Wind River VXWorks TCP predictable vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/59857" }, { "title": "Wind River VxWorks Repair measures for security bypass vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=157616" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03907" }, { "db": "JVNDB", "id": "JVNDB-2015-004019" }, { "db": "CNNVD", "id": "CNNVD-201507-324" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-330", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-81924" }, { "db": "JVNDB", "id": "JVNDB-2015-004019" }, { "db": "NVD", "id": "CVE-2015-3963" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-169-01" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/75302" }, { "trust": 1.7, "url": "http://www.schneider-electric.com/ww/en/download/document/sevd-2015-162-01" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20160324-0001/" }, { "trust": 1.7, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-169-01a" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1032730" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1033181" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3963" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3963" }, { "trust": 0.3, "url": "http://www.windriver.com/products/vxworks.html" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/1ddcb-5255ff0558bfd/cert_security_mini-_bulletin_xrx15aw_for_ph3635mfp_v1-0.pdf" }, { "trust": 0.3, "url": "https://library.e.abb.com/public/03edbe8b0bed400a8b294347be5d66ab/abb_softwarevulnerabilityhandlingadvisory_abb-vu-pgga-1kgt090284.pdf" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03907" }, { "db": "VULHUB", "id": "VHN-81924" }, { "db": "BID", "id": "75302" }, { "db": "JVNDB", "id": "JVNDB-2015-004019" }, { "db": "NVD", "id": "CVE-2015-3963" }, { "db": "CNNVD", "id": "CNNVD-201507-324" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "80541190-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-03907" }, { "db": "VULHUB", "id": "VHN-81924" }, { "db": "BID", "id": "75302" }, { "db": "JVNDB", "id": "JVNDB-2015-004019" }, { "db": "NVD", "id": "CVE-2015-3963" }, { "db": "CNNVD", "id": "CNNVD-201507-324" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-24T00:00:00", "db": "IVD", "id": "80541190-2351-11e6-abef-000c29c66e3d" }, { "date": "2015-06-24T00:00:00", "db": "CNVD", "id": "CNVD-2015-03907" }, { "date": "2015-08-04T00:00:00", "db": "VULHUB", "id": "VHN-81924" }, { "date": "2015-06-18T00:00:00", "db": "BID", "id": "75302" }, { "date": "2015-08-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004019" }, { "date": "2015-08-04T01:59:07.357000", "db": "NVD", "id": "CVE-2015-3963" }, { "date": "2015-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-324" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-24T00:00:00", "db": "CNVD", "id": "CNVD-2015-03907" }, { "date": "2017-11-10T00:00:00", "db": "VULHUB", "id": "VHN-81924" }, { "date": "2016-10-26T05:09:00", "db": "BID", "id": "75302" }, { "date": "2015-08-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004019" }, { "date": "2021-07-22T13:09:15.723000", "db": "NVD", "id": "CVE-2015-3963" }, { "date": "2021-07-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-324" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-324" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wind River VXWorks TCP Predictable vulnerability", "sources": [ { "db": "IVD", "id": "80541190-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-03907" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-324" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.