ID

VAR-201908-0706


CVE

CVE-2019-12265


TITLE

Wind River VxWorks  Vulnerabilities related to resource management in

Trust: 0.8

sources: JVNDB: JVNDB-2019-007852

DESCRIPTION

Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report. The vulnerability stems from the process of constructing command parameters from external input data. The network system or product does not properly filter the special characters in the parameters. An attacker could exploit the vulnerability to execute an illegal command. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. The following products and versions are affected: Wind River Systems VxWorks Version 7, Version 6.9, Version 6.8, Version 6.7, Version 6.6. A vulnerability in the IGMPv3 client component of Wind River VxWorks could allow unauthenticated, remote malicious user to access sensitive information on a targeted system. Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available

Trust: 2.52

sources: NVD: CVE-2019-12265 // JVNDB: JVNDB-2019-007852 // CNVD: CNVD-2019-25707 // IVD: 14a30265-6509-41d2-8c7a-3a278582ea2a // VULHUB: VHN-143994 // VULMON: CVE-2019-12265

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 14a30265-6509-41d2-8c7a-3a278582ea2a // CNVD: CNVD-2019-25707

AFFECTED PRODUCTS

vendor:sonicosmodel: - scope:eqversion:*

Trust: 2.4

vendor:sonicwallmodel:sonicosscope:lteversion:6.5.3.3

Trust: 1.0

vendor:beldenmodel:hirschmann hiosscope:lteversion:07.0.07

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:6.2.4.0

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:6.2.0.0

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:lteversion:8.40.50.00

Trust: 1.0

vendor:windrivermodel:vxworksscope:eqversion:7.0

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:6.5.3.0

Trust: 1.0

vendor:siemensmodel:ruggedcom win7025scope:ltversion:bs5.2.461.17

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:6.2.3.1

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:6.5.1.4

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:5.9.0.0

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:eqversion:6.2.7.7

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:6.2.5.3

Trust: 1.0

vendor:beldenmodel:hirschmann hiosscope:lteversion:05.3.06

Trust: 1.0

vendor:siemensmodel:ruggedcom win7000scope:ltversion:bs5.2.461.17

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:6.5.1.0

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:6.2.6.1

Trust: 1.0

vendor:siemensmodel:power meter 9810scope:eqversion:*

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:6.5.4.3

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:6.2.7.4

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:6.2.7.0

Trust: 1.0

vendor:siemensmodel:siprotec 5scope:ltversion:7.59

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:5.9.1.12

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:6.2.4.3

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:eqversion:6.2.7.0

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:eqversion:6.2.7.1

Trust: 1.0

vendor:siemensmodel:ruggedcom win7018scope:ltversion:bs5.2.461.17

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:6.5.2.3

Trust: 1.0

vendor:beldenmodel:hirschmann hiosscope:lteversion:07.5.01

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:5.9.1.0.

Trust: 1.0

vendor:siemensmodel:power meter 9410scope:ltversion:2.2.1

Trust: 1.0

vendor:windrivermodel:vxworksscope:gteversion:6.5

Trust: 1.0

vendor:beldenmodel:garrettcom magnum dx940escope:lteversion:1.0.1_y7

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:gteversion:8.00

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:6.2.5.0

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:6.5.4.0.

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:6.2.6.0

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:6.5.0.0

Trust: 1.0

vendor:siemensmodel:ruggedcom win7200scope:ltversion:bs5.2.461.17

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:6.2.9.2

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:5.9.0.7

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:6.5.2.0

Trust: 1.0

vendor:siemensmodel:siprotec 5scope:ltversion:7.91

Trust: 1.0

vendor:beldenmodel:hirschmann hiosscope:lteversion:07.2.04

Trust: 1.0

vendor:windrivermodel:vxworksscope:ltversion:6.9.4.12

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:gteversion:6.2.9.0

Trust: 1.0

vendor:sonicwallmodel:sonicosscope:lteversion:6.5.0.3

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:siprotec 5scope: - version: -

Trust: 0.8

vendor:sonicwallmodel:sonicosscope: - version: -

Trust: 0.8

vendor:ウインドリバー株式会社model:vxworksscope: - version: -

Trust: 0.8

vendor:siprotec 5model: - scope:eqversion:*

Trust: 0.6

vendor:windmodel:river systems wind river systems vxworksscope:eqversion:6.9

Trust: 0.6

vendor:windmodel:river systems wind river systems vxworksscope:eqversion:6.8

Trust: 0.6

vendor:windmodel:river systems wind river systems vxworksscope:eqversion:6.7

Trust: 0.6

vendor:windmodel:river systems wind river systems vxworksscope:eqversion:6.6

Trust: 0.6

vendor:vxworksmodel: - scope:eqversion:6.5

Trust: 0.2

vendor:vxworksmodel: - scope:eqversion:6.6

Trust: 0.2

vendor:vxworksmodel: - scope:eqversion:6.7

Trust: 0.2

vendor:vxworksmodel: - scope:eqversion:6.8

Trust: 0.2

vendor:vxworksmodel: - scope:eqversion:6.9.3

Trust: 0.2

vendor:vxworksmodel: - scope:eqversion:6.9.4

Trust: 0.2

vendor:e series santricity os controllermodel: - scope:eqversion:*

Trust: 0.2

vendor:sonicosmodel: - scope:eqversion:6.2.7.0

Trust: 0.2

vendor:sonicosmodel: - scope:eqversion:6.2.7.1

Trust: 0.2

vendor:sonicosmodel: - scope:eqversion:6.2.7.7

Trust: 0.2

sources: IVD: 14a30265-6509-41d2-8c7a-3a278582ea2a // CNVD: CNVD-2019-25707 // JVNDB: JVNDB-2019-007852 // NVD: CVE-2019-12265

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-12265
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-12265
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2019-25707
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201907-1489
value: MEDIUM

Trust: 0.6

IVD: 14a30265-6509-41d2-8c7a-3a278582ea2a
value: MEDIUM

Trust: 0.2

VULHUB: VHN-143994
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-12265
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-12265
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-25707
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 14a30265-6509-41d2-8c7a-3a278582ea2a
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-143994
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-12265
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2019-12265
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 14a30265-6509-41d2-8c7a-3a278582ea2a // CNVD: CNVD-2019-25707 // VULHUB: VHN-143994 // VULMON: CVE-2019-12265 // JVNDB: JVNDB-2019-007852 // CNNVD: CNNVD-201907-1489 // NVD: CVE-2019-12265

PROBLEMTYPE DATA

problemtype:CWE-401

Trust: 1.1

problemtype:resource management issues (CWE-399) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-399

Trust: 0.1

sources: VULHUB: VHN-143994 // JVNDB: JVNDB-2019-007852 // NVD: CVE-2019-12265

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201907-1489

TYPE

Resource management error

Trust: 0.8

sources: IVD: 14a30265-6509-41d2-8c7a-3a278582ea2a // CNNVD: CNNVD-201907-1489

PATCH

title:Security Notices Siemens Siemens Security Advisoryurl:https://security.netapp.com/advisory/ntap-20190802-0001/

Trust: 0.8

title:Patch for Wind River Systems VxWorks Parameter Injection Vulnerability (CNVD-2019-25707)url:https://www.cnvd.org.cn/patchInfo/show/172953

Trust: 0.6

title:Wind River Systems VxWorks Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=95604

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2019/07/29/wind_river_patches_vxworks/

Trust: 0.2

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=1f919286ef48798d96223ef4d2143337

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=2dd69ca01b84b80e09672fedb1c26f51

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=99fa839be73f2df819a67c27caa912f8

Trust: 0.1

title:Fortinet Security Advisories: Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)url:https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories&qid=FG-IR-19-222

Trust: 0.1

sources: CNVD: CNVD-2019-25707 // VULMON: CVE-2019-12265 // JVNDB: JVNDB-2019-007852 // CNNVD: CNNVD-201907-1489

EXTERNAL IDS

db:NVDid:CVE-2019-12265

Trust: 4.2

db:SIEMENSid:SSA-352504

Trust: 1.8

db:SIEMENSid:SSA-189842

Trust: 1.8

db:SIEMENSid:SSA-632562

Trust: 1.8

db:ICS CERTid:ICSA-19-274-01

Trust: 1.4

db:ICS CERTid:ICSA-19-211-01

Trust: 1.4

db:ICS CERTid:ICSMA-19-274-01

Trust: 1.4

db:CNNVDid:CNNVD-201907-1489

Trust: 0.9

db:ICS CERTid:ICSA-23-320-10

Trust: 0.9

db:CNVDid:CNVD-2019-25707

Trust: 0.8

db:JVNid:JVNVU92598492

Trust: 0.8

db:JVNid:JVNVU92467308

Trust: 0.8

db:JVNDBid:JVNDB-2019-007852

Trust: 0.8

db:AUSCERTid:ESB-2019.3695.5

Trust: 0.6

db:AUSCERTid:ASB-2019.0224

Trust: 0.6

db:AUSCERTid:ESB-2019.3245

Trust: 0.6

db:AUSCERTid:ESB-2019.2856

Trust: 0.6

db:IVDid:14A30265-6509-41D2-8C7A-3A278582EA2A

Trust: 0.2

db:VULHUBid:VHN-143994

Trust: 0.1

db:VULMONid:CVE-2019-12265

Trust: 0.1

sources: IVD: 14a30265-6509-41d2-8c7a-3a278582ea2a // CNVD: CNVD-2019-25707 // VULHUB: VHN-143994 // VULMON: CVE-2019-12265 // JVNDB: JVNDB-2019-007852 // CNNVD: CNNVD-201907-1489 // NVD: CVE-2019-12265

REFERENCES

url:https://support2.windriver.com/index.php?page=cve&on=view&id=cve-2019-12265

Trust: 2.3

url:https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/

Trust: 1.8

url:https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf

Trust: 1.8

url:https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf

Trust: 1.8

url:https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf

Trust: 1.8

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0009

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20190802-0001/

Trust: 1.8

url:https://support.f5.com/csp/article/k41190253

Trust: 1.8

url:https://support2.windriver.com/index.php?page=security-notices

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-12265

Trust: 1.4

url:https://www.us-cert.gov/ics/advisories/icsa-19-274-01

Trust: 1.4

url:https://www.us-cert.gov/ics/advisories/icsma-19-274-01

Trust: 1.4

url:https://www.us-cert.gov/ics/advisories/icsa-19-211-01

Trust: 1.4

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-10

Trust: 0.9

url:https://jvn.jp/vu/jvnvu92467308/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92598492/index.html

Trust: 0.8

url:https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf

Trust: 0.6

url:https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks

Trust: 0.6

url:https://fortiguard.com/psirt/fg-ir-19-222

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3695.5/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2856/

Trust: 0.6

url:https://vigilance.fr/vulnerability/wind-river-vxworks-multiple-vulnerabilities-via-ipnet-29905

Trust: 0.6

url:https://www.auscert.org.au/bulletins/asb-2019.0224/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3245/

Trust: 0.6

url:https://support2.windriver.com/index.php?page=cve&on=view&id=cve-2019-12265

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/401.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=60689

Trust: 0.1

sources: CNVD: CNVD-2019-25707 // VULHUB: VHN-143994 // VULMON: CVE-2019-12265 // JVNDB: JVNDB-2019-007852 // CNNVD: CNNVD-201907-1489 // NVD: CVE-2019-12265

SOURCES

db:IVDid:14a30265-6509-41d2-8c7a-3a278582ea2a
db:CNVDid:CNVD-2019-25707
db:VULHUBid:VHN-143994
db:VULMONid:CVE-2019-12265
db:JVNDBid:JVNDB-2019-007852
db:CNNVDid:CNNVD-201907-1489
db:NVDid:CVE-2019-12265

LAST UPDATE DATE

2024-08-14T12:35:47.671000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-25707date:2019-08-02T00:00:00
db:VULHUBid:VHN-143994date:2020-08-24T00:00:00
db:VULMONid:CVE-2019-12265date:2022-08-12T00:00:00
db:JVNDBid:JVNDB-2019-007852date:2023-11-21T01:26:00
db:CNNVDid:CNNVD-201907-1489date:2022-03-10T00:00:00
db:NVDid:CVE-2019-12265date:2022-08-12T18:44:44.460

SOURCES RELEASE DATE

db:IVDid:14a30265-6509-41d2-8c7a-3a278582ea2adate:2019-08-02T00:00:00
db:CNVDid:CNVD-2019-25707date:2019-08-02T00:00:00
db:VULHUBid:VHN-143994date:2019-08-09T00:00:00
db:VULMONid:CVE-2019-12265date:2019-08-09T00:00:00
db:JVNDBid:JVNDB-2019-007852date:2019-08-21T00:00:00
db:CNNVDid:CNNVD-201907-1489date:2019-07-29T00:00:00
db:NVDid:CVE-2019-12265date:2019-08-09T19:15:11.327