First published: Fri Aug 09 2019(Updated: )
Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability: DoS of TCP connection via malformed TCP options.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wind River VxWorks | >=6.5<6.9.4.12 | |
Wind River VxWorks | =7.0 | |
SonicWall SonicOS | >=5.9.0.0<=5.9.0.7 | |
SonicWall SonicOS | >=5.9.1.0.<=5.9.1.12 | |
SonicWall SonicOS | >=6.2.0.0<=6.2.3.1 | |
SonicWall SonicOS | >=6.2.4.0<=6.2.4.3 | |
SonicWall SonicOS | >=6.2.5.0<=6.2.5.3 | |
SonicWall SonicOS | >=6.2.6.0<=6.2.6.1 | |
SonicWall SonicOS | >=6.2.7.0<=6.2.7.4 | |
SonicWall SonicOS | >=6.2.9.0<=6.2.9.2 | |
SonicWall SonicOS | >=6.5.0.0<=6.5.0.3 | |
SonicWall SonicOS | >=6.5.1.0<=6.5.1.4 | |
SonicWall SonicOS | >=6.5.2.0<=6.5.2.3 | |
SonicWall SonicOS | >=6.5.3.0<=6.5.3.3 | |
SonicWall SonicOS | >=6.5.4.0.<=6.5.4.3 | |
SonicWall SonicOS | =6.2.7.0 | |
SonicWall SonicOS | =6.2.7.1 | |
SonicWall SonicOS | =6.2.7.7 | |
Siemens SIPROTEC firmware | <7.59 | |
Siemens SIPROTEC firmware | ||
NetApp E-Series SANtricity OS Controller | >=8.00<=8.40.50.00 | |
Siemens SIPROTEC firmware | <7.91 | |
Siemens 9410 Power Meter Firmware | <2.2.1 | |
Siemens 9410 Power Meter Firmware | ||
Siemens 9810 Power Meter Firmware | ||
Siemens 9810 Power Meter | ||
Siemens RuggedCom Win7000 | <bs5.2.461.17 | |
Siemens Ruggedcom Win7000 Firmware | ||
Siemens RuggedCom WIN7018 Firmware | <bs5.2.461.17 | |
Siemens RuggedCom WIN7018 Firmware | ||
Siemens Ruggedcom Win7025 Firmware | <bs5.2.461.17 | |
Siemens Ruggedcom Win7025 Firmware | ||
Siemens Ruggedcom WIN7200 Firmware | <bs5.2.461.17 | |
Siemens Ruggedcom WIN7200 Firmware | ||
Belden Hirschmann HIOS | <=07.0.07 | |
Belden Hirschmann EES20 | ||
Belden Hirschmann EES25 | ||
Belden Hirschmann EESX20 | ||
Belden Hirschmann EESX30 | ||
Belden Hirschmann GRS1020 | ||
Belden Hirschmann GRS1030 | ||
Belden Hirschmann GRS1042 | ||
Belden Hirschmann GRS1120 | ||
Belden Hirschmann GRS1130 | ||
Belden Hirschmann GRS1142 | ||
Belden Hirschmann MSP30 | ||
Belden Hirschmann MSP32 | ||
Belden Hirschmann Rail Switch Power Lite | ||
Belden Hirschmann Rail Switch Power Smart | ||
Belden Hirschmann RED25 | ||
Belden Hirschmann RSP20 | ||
Belden Hirschmann RSP25 | ||
Belden Hirschmann RSP30 | ||
Belden Hirschmann RSP35 | ||
Belden Hirschmann RSP-E30 | ||
Belden Hirschmann RSPE32 | ||
Belden Hirschmann RSPE35 | ||
Belden Hirschmann RSPE37 | ||
Belden Hirschmann HIOS | <=07.5.01 | |
Belden Hirschmann MSP40 | ||
Belden Hirschmann Octopus | ||
Belden Hirschmann HIOS | <=07.2.04 | |
belden hirschmann dragon mach4000 | ||
Belden Hirschmann Dragon MACH4500 | ||
Belden Hirschmann HIOS | <=05.3.06 | |
Eagle One | ||
Belden Hirschmann Eagle20 | ||
Belden Hirschmann Eagle30 | ||
Garrettcom Magnum DX940E | <=1.0.1_y7 | |
Garrettcom Magnum DX940E |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12258 is classified as a high severity vulnerability due to potential denial of service impacts on TCP connections.
To fix CVE-2019-12258, ensure that your affected Wind River VxWorks or SonicWall SonicOS software is updated to a version that addresses the vulnerability.
CVE-2019-12258 affects Wind River VxWorks versions 6.6 through 6.9.4.12 and various versions of SonicWall SonicOS between 5.9.0.0 up to 6.5.4.3.
CVE-2019-12258 is a session fixation vulnerability in the TCP component of the affected software.
Yes, CVE-2019-12258 can potentially allow attackers to disrupt TCP connections, leading to denial of service conditions.