Windriver
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Windriver product.
RSS Feeds for Windriver security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Windriver products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Windriver Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2025 there have been 0 vulnerabilities in Windriver. Windriver did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 0 | 0.00 |
2023 | 1 | 8.80 |
2022 | 2 | 7.50 |
2021 | 9 | 7.96 |
2020 | 1 | 7.50 |
2019 | 12 | 8.45 |
2018 | 0 | 0.00 |
It may take a day or so for new Windriver vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Windriver Security Vulnerabilities
An issue was discovered in Wind River VxWorks 6.9 and 7
CVE-2023-38346
8.8 - High
- September 22, 2023
An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtract`` implements TAR file extraction and thereby also processes files within an archive that have relative or absolute file paths. A developer using the "tarExtract" function may expect that the function will strip leading slashes from absolute paths or stop processing when encountering relative paths that are outside of the extraction path, unless otherwise forced. This could lead to unexpected and undocumented behavior, which in general could result in a directory traversal, and associated unexpected behavior.
Directory traversal
An issue was discovered in Wind River VxWorks 6.9 and 7
CVE-2022-38767
7.5 - High
- November 25, 2022
An issue was discovered in Wind River VxWorks 6.9 and 7, that allows a specifically crafted packet sent by a Radius server, may cause Denial of Service during the IP Radius access procedure.
In Wind River VxWorks 6.9 and 7
CVE-2022-23937
7.5 - High
- March 29, 2022
In Wind River VxWorks 6.9 and 7, a specific crafted packet may lead to an out-of-bounds read during an IKE initial exchange scenario.
Out-of-bounds Read
An issue was discovered in VxWorks 6.9 through 7
CVE-2021-43268
6.5 - Medium
- November 24, 2021
An issue was discovered in VxWorks 6.9 through 7. In the IKE component, a specifically crafted packet may lead to reading beyond the end of a buffer, or a double free.
Double-free
An issue was discovered in Wind River VxWorks 7
CVE-2020-35198
9.8 - Critical
- May 12, 2021
An issue was discovered in Wind River VxWorks 7. The memory allocator has a possible integer overflow in calculating a memory block's size to be allocated by calloc(). As a result, the actual memory allocated is smaller than the buffer size specified by the arguments, leading to memory corruption.
Integer Overflow or Wraparound
An issue was discovered in Wind River VxWorks before 6.5
CVE-2021-29998
9.8 - Critical
- April 13, 2021
An issue was discovered in Wind River VxWorks before 6.5. There is a possible heap overflow in dhcp client.
Memory Corruption
An issue was discovered in Wind River VxWorks 7 before 21.03
CVE-2021-29997
5.3 - Medium
- April 13, 2021
An issue was discovered in Wind River VxWorks 7 before 21.03. A specially crafted packet may lead to buffer over-read on IKE.
Out-of-bounds Read
An issue was discovered in Wind River VxWorks through 6.8
CVE-2021-29999
9.8 - Critical
- April 13, 2021
An issue was discovered in Wind River VxWorks through 6.8. There is a possible stack overflow in dhcp server.
Memory Corruption
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client
CVE-2021-3449
5.9 - Medium
- March 25, 2021
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
NULL Pointer Dereference
The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain
CVE-2021-3450
7.4 - High
- March 25, 2021
The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).
Improper Certificate Validation