CWE
330
Advisory Published
Updated

CVE-2015-3963

First published: Tue Aug 04 2015(Updated: )

Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x before 6.9.4.4, and 7.x before 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
Wind River VxWorks>=6.5<=6.6
Wind River VxWorks>=6.7<6.7.1.1
Wind River VxWorks>=6.8<6.8.3
Wind River VxWorks>=6.9<6.9.4.4
Wind River VxWorks=6.6.3
Wind River VxWorks=6.6.4
Wind River VxWorks=6.6.4.1
Wind River VxWorks=7.0
Sage 1210
Sage 1230
Schneider Electric Sage 1250
Schneider Electric Sage 1310
Schneider Electric Sage 1330
Schneider Electric Sage 1350
Sage 1410
Sage 1430
Sage 1450
Schneider Electric Sage 2200
Schneider Electric Sage 2400
Schneider-electric Telvent Sage 3030 Firmware
Sage 3030 Magnum

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2015-3963?

    CVE-2015-3963 is classified as a high severity vulnerability due to improper generation of TCP initial sequence number values.

  • How do I fix CVE-2015-3963?

    To mitigate CVE-2015-3963, update VxWorks to a version that is 5.5.1 or higher, or to 6.7.1.1 or higher for affected 6.5.x to 6.9.x versions.

  • Which versions of Wind River VxWorks are affected by CVE-2015-3963?

    CVE-2015-3963 affects Wind River VxWorks versions prior to 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, and 6.9.x before 6.9.4.4.

  • What devices commonly use the vulnerable versions of VxWorks related to CVE-2015-3963?

    Schneider Electric SAGE RTU devices are commonly affected by CVE-2015-3963 due to their use of vulnerable VxWorks versions.

  • Can CVE-2015-3963 lead to remote code execution?

    Yes, CVE-2015-3963 can potentially be exploited to facilitate remote code execution due to TCP sequence number manipulation.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203