Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4hhv-jc45-cmpc

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockwell Automation 1756-ENBT series A with firmware 3.2.6 and 3.6.1 and other products, allows remote attackers to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185, a related issue to CVE-2005-3804.

The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockwell Automation 1756-ENBT series A with firmware 3.2.6 and 3.6.1 and other products, allows remote attackers to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185, a related issue to CVE-2005-3804.

EPSS

Процентиль: 98%
0.59953
Средний

Дефекты

CWE-863

Связанные уязвимости

nvd
больше 15 лет назад

The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockwell Automation 1756-ENBT series A with firmware 3.2.6 and 3.6.1 and other products, allows remote attackers to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185, a related issue to CVE-2005-3804.

EPSS

Процентиль: 98%
0.59953
Средний

Дефекты

CWE-863