CVE-2015-3963

CVSS V2 Medium 5.8 CVSS V3 None
Description
Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x before 6.9.4.4, and 7.x before 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.
Overview
  • CVE ID
  • CVE-2015-3963
  • Assigner
  • ics-cert@hq.dhs.gov
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2015-08-04T01:59:07
  • Last Modified Date
  • 2021-07-22T13:09:15
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:* 1 OR 6.5 6.6
cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:* 1 OR 6.7 6.7.1.1
cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:* 1 OR 6.8 6.8.3
cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:* 1 OR 6.9 6.9.4.4
cpe:2.3:o:windriver:vxworks:6.6.3:*:*:*:cert:*:*:* 1 OR
cpe:2.3:o:windriver:vxworks:6.6.4:*:*:*:cert:*:*:* 1 OR
cpe:2.3:o:windriver:vxworks:6.6.4.1:*:*:*:cert:*:*:* 1 OR
cpe:2.3:o:windriver:vxworks:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:schneider-electric:sage_1210:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_1230:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_1250:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_1310:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_1330:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_1350:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_1410:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_1430:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_1450:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_2200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_2400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_3030:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:schneider-electric:sage_3030_magnum:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 4.9
References
Reference URL Reference Tags
https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01 Third Party Advisory US Government Resource
http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-162-01 Patch Third Party Advisory
http://www.securityfocus.com/bid/75302 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032730 Third Party Advisory VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01A Third Party Advisory US Government Resource
http://www.securitytracker.com/id/1033181 Third Party Advisory VDB Entry
https://security.netapp.com/advisory/ntap-20160324-0001/ Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 15:54:33 Added to TrackCVE
2022-12-02 05:47:43 2015-08-04T01:59Z 2015-08-04T01:59:07 CVE Published Date updated
2022-12-02 05:47:43 2021-07-22T13:09:15 CVE Modified Date updated
2022-12-02 05:47:43 Analyzed Vulnerability Status updated