Vulnerability Details CVE-2015-3963
Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x before 6.9.4.4, and 7.x before 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.037
EPSS Ranking 87.3%
CVSS Severity
CVSS v2 Score 5.8
Products affected by CVE-2015-3963
-
cpe:2.3:h:schneider-electric:sage_1210:-
-
cpe:2.3:h:schneider-electric:sage_1230:-
-
cpe:2.3:h:schneider-electric:sage_1250:-
-
cpe:2.3:h:schneider-electric:sage_1310:-
-
cpe:2.3:h:schneider-electric:sage_1330:-
-
cpe:2.3:h:schneider-electric:sage_1350:-
-
cpe:2.3:h:schneider-electric:sage_1410:-
-
cpe:2.3:h:schneider-electric:sage_1430:-
-
cpe:2.3:h:schneider-electric:sage_1450:-
-
cpe:2.3:h:schneider-electric:sage_2200:-
-
cpe:2.3:h:schneider-electric:sage_2400:-
-
cpe:2.3:h:schneider-electric:sage_3030:-
-
cpe:2.3:h:schneider-electric:sage_3030_magnum:-
-
cpe:2.3:o:windriver:vxworks:6.5
-
cpe:2.3:o:windriver:vxworks:6.6
-
cpe:2.3:o:windriver:vxworks:6.6.3
-
cpe:2.3:o:windriver:vxworks:6.6.4
-
cpe:2.3:o:windriver:vxworks:6.6.4.1
-
cpe:2.3:o:windriver:vxworks:6.7
-
cpe:2.3:o:windriver:vxworks:6.8
-
cpe:2.3:o:windriver:vxworks:6.9
-
cpe:2.3:o:windriver:vxworks:6.9.1
-
cpe:2.3:o:windriver:vxworks:6.9.2
-
cpe:2.3:o:windriver:vxworks:6.9.3
-
cpe:2.3:o:windriver:vxworks:6.9.3.1
-
cpe:2.3:o:windriver:vxworks:6.9.4
-
cpe:2.3:o:windriver:vxworks:6.9.4.1
-
cpe:2.3:o:windriver:vxworks:7.0