First published: Fri Nov 25 2022(Updated: )
An issue was discovered in Wind River VxWorks 6.9 and 7, that allows a specifically crafted packet sent by a Radius server, may cause Denial of Service during the IP Radius access procedure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Windriver Vxworks | >=6.9<6.9.4.12 | |
Windriver Vxworks | =6.9.4.12 | |
Windriver Vxworks | =6.9.4.12-rolling_cumulative_patch_layer1 | |
Windriver Vxworks | =6.9.4.12-rolling_cumulative_patch_layer2 | |
Windriver Vxworks | =6.9.4.12-rolling_cumulative_patch_layer3 | |
Windriver Vxworks | =6.9.4.12-rolling_cumulative_patch_layer4 | |
Windriver Vxworks | =6.9.4.12-rolling_cumulative_patch_layer5 | |
Windriver Vxworks | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-38767.
The severity level of CVE-2022-38767 is high.
Wind River VxWorks 6.9 and 7 are affected by CVE-2022-38767.
This vulnerability can be exploited by sending a specifically crafted packet by a Radius server during the IP Radius access procedure.
Please refer to the official Wind River website for available patches or fixes for CVE-2022-38767.