{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "D796397A-5CB0-4BF1-A2FD-8943B15751F8", "versionEndExcluding": "6.9.4.12", "versionStartIncluding": "6.5", "vulnerable": true}, {"criteria": "cpe:2.3:o:windriver:vxworks:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "F3497F9B-A721-4289-A49F-A19D0F7F0148", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "16C417C4-DC9B-48A8-AEAE-755BCC2DA389", "versionEndIncluding": "5.9.0.7", "versionStartIncluding": "5.9.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F047B55-4AAB-438D-BBF2-A0BAD4A5AFB2", "versionEndIncluding": "5.9.1.12", "versionStartIncluding": "5.9.1.0.", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "90EA3BDF-084B-4D67-B0EF-4D27CA0EF283", "versionEndIncluding": "6.2.3.1", "versionStartIncluding": "6.2.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D59A1A87-D7B3-4F38-A83E-8CBF0A55A476", "versionEndIncluding": "6.2.4.3", "versionStartIncluding": "6.2.4.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "C306A1CA-3A13-4085-A481-25A6B2D2412A", "versionEndIncluding": "6.2.5.3", "versionStartIncluding": "6.2.5.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "819517C6-9288-45B1-96B0-90B05AA5F3C4", "versionEndIncluding": "6.2.6.1", "versionStartIncluding": "6.2.6.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "31148F5D-C86F-463D-9A5B-9D82515EF901", "versionEndIncluding": "6.2.7.4", "versionStartIncluding": "6.2.7.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "24520D09-E8D2-43BE-A4D3-19FE828A4309", "versionEndIncluding": "6.2.9.2", "versionStartIncluding": "6.2.9.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF416ABF-027E-4571-A81C-36280BFAA1F1", "versionEndIncluding": "6.5.0.3", "versionStartIncluding": "6.5.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C253EDA-69CE-4C3A-9ABF-A7C55CEFA29C", "versionEndIncluding": "6.5.1.4", "versionStartIncluding": "6.5.1.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "70C43F8A-0B85-4042-B691-8FDC841A3C2B", "versionEndIncluding": "6.5.2.3", "versionStartIncluding": "6.5.2.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F26B212-EE89-485A-A414-553C0F39DCA3", "versionEndIncluding": "6.5.3.3", "versionStartIncluding": "6.5.3.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6BA5213-EA5E-423B-9207-E06AED2917B3", "versionEndIncluding": "6.5.4.3", "versionStartIncluding": "6.5.4.0.", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:6.2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7BC6DEEC-5FB4-4017-B8F0-99A17AD93A52", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:6.2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "DA6DA86B-D7E7-48E6-B841-206B9501DA67", "vulnerable": true}, {"criteria": "cpe:2.3:o:sonicwall:sonicos:6.2.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "D0A2A903-3092-40FB-99FE-B864C52D343E", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp200", "matchCriteriaId": "E7F2B915-D41F-4D3C-A52D-A63AB729716F", "versionEndExcluding": "7.59", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:siprotec_5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4732E0B8-AF15-4C24-A3D4-8826E0440FDF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp300", "matchCriteriaId": "00314478-416E-488B-ADBF-DDED873ABE41", "versionEndExcluding": "7.91", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:siprotec_5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4732E0B8-AF15-4C24-A3D4-8826E0440FDF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp100", "matchCriteriaId": "353C593E-564E-4D53-ABDF-C5A442D944F2", "versionEndExcluding": "7.91", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:siprotec_5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4732E0B8-AF15-4C24-A3D4-8826E0440FDF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:ruggedcom_win7000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47C998D1-9DD5-4470-9241-174170541408", "versionEndExcluding": "bs5.2.461.17", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD6F6C12-9373-48F2-B576-C9AC7A287B53", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:ruggedcom_win7200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD25C864-C272-45B7-8EC5-9120DF6A2072", "versionEndExcluding": "bs5.2.461.17", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7146409-09B7-499C-9544-361B234E952D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:ruggedcom_win7025_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE5D7B8D-E74F-4839-8839-23894307992D", "versionEndExcluding": "bs5.2.461.17", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:siemens:ruggedcom_win7025:-:*:*:*:*:*:*:*", "matchCriteriaId": "63967CFD-D35C-4793-858A-032C44E282F9", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:ruggedcom_win7018_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8216AFC1-213B-4E31-8660-5161E08A7C4E", "versionEndExcluding": "bs5.2.461.17", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:siemens:ruggedcom_win7018:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0F5DBF-4730-40CE-B9CE-DD4DA31D3ED6", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:ruggedcom_win7200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD25C864-C272-45B7-8EC5-9120DF6A2072", "versionEndExcluding": "bs5.2.461.17", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7146409-09B7-499C-9544-361B234E952D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:9410_power_meter_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A9304D7-F978-4C0C-99D9-48539B13BF94", "versionEndExcluding": "2.2.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:siemens:9410_power_meter:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1E5C66B-87B9-494B-AD75-4DCCEC158A4D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:9810_power_meter_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D33EA5A-8CD6-43FA-90C3-E0533BA87A6F", "versionEndExcluding": "2.2.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:siemens:9810_power_meter:-:*:*:*:*:*:*:*", "matchCriteriaId": "C001993E-5668-42F9-9D77-7A220A167AD1", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "matchCriteriaId": "3950CA89-B400-427C-B6F2-54337AB694E0", "versionEndIncluding": "07.0.07", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:belden:hirschmann_ees20:-:*:*:*:*:*:*:*", "matchCriteriaId": "D35A90AD-034E-434A-B989-4F871E0AD9A5", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_ees25:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3EF7BBA-2BCC-4A16-BBEE-E67CE8F95BE4", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_eesx20:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F453AF-21B0-4611-95D7-88AD821632E8", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_eesx30:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE6A655D-ED55-4344-9F75-5995371C87C3", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_grs1020:-:*:*:*:*:*:*:*", "matchCriteriaId": "29576107-85D0-4877-875F-7F60EFDB803D", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_grs1030:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF6200A3-7B4F-4A8E-B9DC-EE6A82093C20", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_grs1042:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBA19D8-8B2D-4AD0-AA77-A3139C33F44D", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_grs1120:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4F7FEA-BB1F-405E-A047-87D0BF0DF054", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_grs1130:-:*:*:*:*:*:*:*", "matchCriteriaId": "641912E2-C368-4438-8D5C-F6615B9FDABC", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_grs1142:-:*:*:*:*:*:*:*", "matchCriteriaId": "F86BB5E8-4499-4E4F-AE5E-1471B297C16F", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_msp30:-:*:*:*:*:*:*:*", "matchCriteriaId": "E89FAE18-5B44-4203-ABFD-BC40AF7E51BE", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_msp32:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D0DFE2E-2356-46D6-B2D9-89FD907CA168", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE06D94-B686-4468-86CF-AA68BB5CFEF4", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_smart:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC6487F7-284A-40C2-B70D-9380AD2A47C1", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_red25:-:*:*:*:*:*:*:*", "matchCriteriaId": "79354FA2-4C48-4506-94BE-7B9ECB18015D", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_rsp20:-:*:*:*:*:*:*:*", "matchCriteriaId": "DED918F8-041E-4FFC-AFE8-484828696EDB", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_rsp25:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ED7974C-BBE6-4BAE-8962-7B5638C7AE20", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_rsp30:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EE16D46-7BA9-43D4-BB4E-1B638CE6C41B", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_rsp35:-:*:*:*:*:*:*:*", "matchCriteriaId": "165B837A-EF09-489F-BD7C-54107F491BC8", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_rspe30:-:*:*:*:*:*:*:*", "matchCriteriaId": "C06BF302-8E62-41DB-AA67-6369527B598F", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_rspe32:-:*:*:*:*:*:*:*", "matchCriteriaId": "56D29DAB-C5D6-4539-86E4-43624FB957A9", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_rspe35:-:*:*:*:*:*:*:*", "matchCriteriaId": "305A9B3E-786C-4F8E-BE36-B4ED84650288", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_rspe37:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CBC8B88-4EC3-4827-B100-3A5A91B29CC2", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "matchCriteriaId": "2681FAC3-1E59-497A-9931-F4059F84EF86", "versionEndIncluding": "07.5.01", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:belden:hirschmann_msp40:-:*:*:*:*:*:*:*", "matchCriteriaId": "E92390DF-BFCC-4F30-88A0-33F63CA9B1B3", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3:-:*:*:*:*:*:*:*", "matchCriteriaId": "A18D078E-1F1A-4DE5-AE43-840D96BE1C6C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "matchCriteriaId": "98C84F5B-72F6-4059-B634-80EE072D0DF9", "versionEndIncluding": "07.2.04", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E0562EC-4942-4D14-A634-8A6A5FDB9561", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "79E8B334-8109-4664-8DCC-10876BD702DC", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFB09BFE-D6C9-4433-A53A-F79608BFACA9", "versionEndIncluding": "05.3.06", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:belden:hirschmann_eagle_one:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D6D7B3E-90AD-43D9-9192-453A37921E8F", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_eagle20:-:*:*:*:*:*:*:*", "matchCriteriaId": "771189D9-34F0-400D-938B-2AA218C28C43", "vulnerable": false}, {"criteria": "cpe:2.3:h:belden:hirschmann_eagle30:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DCF228A-F3A8-4B36-A105-04E88980BA76", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:belden:garrettcom_magnum_dx940e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE3BDD99-1DFA-4037-8E77-902F39842153", "versionEndIncluding": "1.0.1_y7", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:belden:garrettcom_magnum_dx940e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B635F0-96C1-49DA-957C-2ECD55A316C0", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and vx7 has an array index error in the IGMPv3 client component. There is an IPNET security vulnerability: DoS via NULL dereference in IGMP parsing."}, {"lang": "es", "value": "Wind River VxWorks versiones 6.6, 6.7 , 6.8, 6.9 y vx7, presenta un error de \u00edndice de matriz en el componente cliente IGMPv3. Se presenta una vulnerabilidad de seguridad de IPNET: DoS por medio de una desreferencia de NULL en el an\u00e1lisis IGMP."}], "id": "CVE-2019-12259", "lastModified": "2024-11-21T04:22:30.387", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-08-09T19:15:11.140", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://support.f5.com/csp/article/K41190253"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12259"}, {"source": "cve@mitre.org", "tags": ["Issue Tracking", "Vendor Advisory"], "url": "https://support2.windriver.com/index.php?page=security-notices"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://support.f5.com/csp/article/K41190253"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12259"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Vendor Advisory"], "url": "https://support2.windriver.com/index.php?page=security-notices"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-476"}], "source": "nvd@nist.gov", "type": "Primary"}]}