VYPR
Unrated severityNVD Advisory· Published Aug 4, 2015· Updated May 6, 2026

CVE-2015-3963

CVE-2015-3963

Description

Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x before 6.9.4.4, and 7.x before 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.

Affected products

5
  • Windriver/Vxworks5 versions
    cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*range: >=6.5,<=6.6
    • cpe:2.3:o:windriver:vxworks:6.6.3:*:*:*:cert:*:*:*
    • cpe:2.3:o:windriver:vxworks:6.6.4.1:*:*:*:cert:*:*:*
    • cpe:2.3:o:windriver:vxworks:6.6.4:*:*:*:cert:*:*:*
    • cpe:2.3:o:windriver:vxworks:7.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.