Critical Vulnerabilities Dubbed URGENT/11 Place Devices Running VxWorks at Risk of RCE Attacks

Ryan Seguin

Eleven vulnerabilities, including RCEs, denials of service, information leaks and logical flaws, were recently disclosed, impacting the RTOS VxWorks


The Armis Research Team has released an advisory for URGENT/11, which contains six critical RCE and five additional vulnerabilities in VxWorks, a Real-Time Operating System (RTOS) found in over 2 billion devices, including critical industrial, medical and enterprise hardware. Wind River, the maintainer of VxWorks, released patches on July 19 for all 11 of the vulnerabilities.


VxWorks is an RTOS found in a wide array of devices like firewalls, medical equipment and industrial control systems. The vulnerabilities found affect VxWorks’ TCP/IP stack (IPnet) and could allow attackers to circumvent Network Address Translation (NAT) and Firewalls via maliciously crafted IP packets. Wind River acquired the IPnet networking stack in 2006. Prior to this, the stack was licensed and used by other real-time operating system vendors, which potentially widens the number of affected devices that have yet to be patched. The scale and potential impact of these vulnerabilities create similar threats on par with the likes of WannaCry and ETERNALBLUE.

The following video from Armis provides an overview of URGENT/11 and its potential impact:

From Wind River's URGENT/11 security advisory, the following vulnerabilities and their respective details are:

CVE CVSSv3 Score Component Title CVE-2019-12256 9.8 TCP/IP Stack Stack overflow in the parsing of IPv4 packets’ IP options CVE-2019-12257 8.8 DHCP Client Heap overflow in DHCP Offer/ACK parsing inside ipdhcpc CVE-2019-12255 9.8 TCP Urgent Pointer TCP Urgent Pointer = 0 leads to integer underflow CVE-2019-12260 9.8 TCP Urgent Pointer TCP Urgent Pointer state confusion caused by malformed TCP AO option CVE-2019-12261 8.8 TCP Urgent Pointer TCP Urgent Pointer state confusion during connect() to a remote host CVE-2019-12263 8.1 TCP Urgent Pointer TCP Urgent Pointer state confusion due to race condition CVE-2019-12258 7.5 TCP Connection DoS of TCP connection via malformed TCP options CVE-2019-12259 6.3 TCP/IP Stack DoS via NULL dereference in IGMP parsing CVE-2019-12262 7.1 ARP Handler Handling of unsolicited Reverse ARP replies (Logical Flaw) CVE-2019-12264 7.1 DHCP Logical flaw in IPv4 assignment by the ipdhcpc DHCP client CVE-2019-12265 5.4 IGMP IGMP Information leak via IGMPv3 specific membership report

Proof of Concept

While no Proof of Concept (PoC) code has been released for these vulnerabilities, the Armis team has provided two videos demonstrating how an attacker could compromise internal assets from other internet-facing devices:


Organizations and individual users will need to apply updates from their respective device vendors in order to fix these vulnerabilities within their environments. Vendors like SonicWall and Xerox have reportedly released updates for their affected devices. Detection and mitigation may take some time, however, given the  sheer magnitude of the number of devices utilizing VxWorks.

Tenable will add active and passive plugins as patches and updates become available from different vendors. Our OS Identification plugin can enumerate hosts running VxWorks, which will be available in the plugin output section in the scan results for a given asset. Tenable Nessus Network Monitor (NNM) currently offers multiple VxWorks detection plugins, and proactively detects assets that may be running vulnerable versions of VxWorks.

For users seeking guidance on configuring NNM and creating useful notifications for VxWorks devices, please see our NNM configuration and usage documentation or reach out to our support team at

Identifying affected systems

A list of plugins to identify these vulnerabilities will appear here as they’re released. Please note that vulnerability detection plugin creation also relies on vendor support for any given device. We encourage organizations to examine the plugin output section of our informational detection plugins in their scan results to identify vulnerable systems in addition to scanning with direct vulnerability detection plugins.

Get more information

Join Tenable's Security Response Team on the Tenable Community.

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface.

Get a free 60-day trial of

Read more >

Published on Jul 29, 2019

People also viewed

Senior Financial Analyst - Corporate Development

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Finance Finance
Your Role:Become a core member of Tenable’s internal corporate development team and assist with business, financial and valuation modeling for mergers, acquisitions and other strategic investments and initiatives.  Assist with evaluating elements ...

Cloud Security Intern

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Information Technology Internships
Your Role: The Cloud Security Intern will help Tenable secure their use of cloud systems across the company.  The intern will develop, implement and monitor security solutions for the cloud that assess risk, keeps Tenable data safe and bake in sec...

Salesforce Administrator

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Business Platforms Business Platforms
Your Role:Tenable Network Security is looking for a Administrator to join our internal business platforms team. The qualified candidate will engage in the administration of Tenable’s instance, play a key role in the ...

Technical Support Intern

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Technical Support Internships
Your Role: The Technical Support Intern provides consistent, world-class security, network, and product support for specific Tenable products. In serving as the primary liaison between the company and customer, the Technical Support Intern resolve...

Research Intern - Plugin Automation

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Research Internships
Your Role: Tenable Research is looking for a Software Engineer Intern for the Plugin Automation team.  The position will involve developing frameworks for automated content creation, and processes for validating and publishing the content that is ...

Sales Development Manager

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Lead Generation Sales
Your Role:Tenable is looking for an experienced SDR Manager that will report to the Senior Director of Worldwide Sales Development and is responsible for ensuring the success of the Americas Tenable Sales Development team’s goals, as well as contr...

We have big plans for continued global growth, and we’re looking for people who are creative, flexible and dedicated to helping us build something great – something that matters.