CVE-2015-7599
moderate-risk
Published 2017-02-07
Integer overflow in the _authenticate function in svc_auth.c in Wind River VxWorks 5.5 through 6.9.4.1, when the Remote Procedure Call (RPC) protocol is enabled, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a username and password.
Do I need to act?
~
8.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Vendors
References (10)
Third Party Advisory
http://www.securityfocus.com/bid/79205
Technical Description
https://www.syscan360.org/slides/2015_EN_AttackingVxWorksFromstoneagetointerstel...
Third Party Advisory
http://www.securityfocus.com/bid/79205
Technical Description
https://www.syscan360.org/slides/2015_EN_AttackingVxWorksFromstoneagetointerstel...
47
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
10/34 · Low
Exposure
13/34 · Low