{"api_version":"1","generated_at":"2026-04-22T22:49:34+00:00","cve":"CVE-2022-38767","urls":{"html":"https://cve.report/CVE-2022-38767","api":"https://cve.report/api/cve/CVE-2022-38767.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-38767","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-38767"},"summary":{"title":"CVE-2022-38767","description":"An issue was discovered in Wind River VxWorks 6.9 and 7, that allows a specifically crafted packet sent by a Radius server, may cause Denial of Service during the IP Radius access procedure.","state":"PUBLISHED","assigner":"mitre","published_at":"2022-11-25 15:15:10","updated_at":"2026-04-14 10:16:25"},"problem_types":["NVD-CWE-noinfo","n/a","CWE-noinfo Not enough information"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"3.1","source":"ADP","type":"DECLARED","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"references":[{"url":"https://windriver.com","name":"https://windriver.com","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Wind River Software | Safe, Secure, Reliable","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-726834.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-726834.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2022-38767","name":"https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2022-38767","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"CVE-2022-38767","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-38767","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38767","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 6MD85 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 6MD86 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 6MD89 (CP300)","version":"affected V7.80 V9.64 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 6MU85 (CP300)","version":"affected V7.90 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7KE85 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7SA86 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7SA87 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7SD86 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7SD87 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7SJ85 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7SJ86 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7SK85 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7SL86 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7SL87 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7SS85 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7ST85 (CP300)","version":"affected V8.81 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7ST86 (CP300)","version":"affected V9.20 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7SX85 (CP300)","version":"affected V8.30 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7UM85 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7UT85 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7UT86 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7UT87 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7VE85 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 7VK87 (CP300)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1)","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 Communication Module ETH-BD-2FO","version":"affected V7.80 V9.30 custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIPROTEC 5 Compact 7SX800 (CP050)","version":"affected V8.70 V9.30 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"38767","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"windriver","cpe5":"vxworks","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"38767","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"windriver","cpe5":"vxworks","cpe6":"6.9.4.12","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"38767","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"windriver","cpe5":"vxworks","cpe6":"6.9.4.12","cpe7":"rolling_cumulative_patch_layer1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"38767","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"windriver","cpe5":"vxworks","cpe6":"6.9.4.12","cpe7":"rolling_cumulative_patch_layer2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"38767","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"windriver","cpe5":"vxworks","cpe6":"6.9.4.12","cpe7":"rolling_cumulative_patch_layer3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"38767","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"windriver","cpe5":"vxworks","cpe6":"6.9.4.12","cpe7":"rolling_cumulative_patch_layer4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"38767","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"windriver","cpe5":"vxworks","cpe6":"6.9.4.12","cpe7":"rolling_cumulative_patch_layer5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"38767","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"windriver","cpe5":"vxworks","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2022","cve_id":"38767","cve":"CVE-2022-38767","epss":"0.005010000","percentile":"0.660370000","score_date":"2026-04-15","updated_at":"2026-04-16 00:13:56"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-03T11:02:14.648Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://windriver.com"},{"tags":["x_transferred"],"url":"https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2022-38767"}],"title":"CVE Program Container"},{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2022-38767","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-04-25T18:43:40.135126Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"description":"CWE-noinfo Not enough information","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-04-25T18:44:18.928Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"affected":[{"defaultStatus":"unknown","product":"SIPROTEC 5 6MD85 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 6MD86 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 6MD89 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.64","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 6MU85 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.90","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7KE85 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7SA86 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7SA87 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7SD86 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7SD87 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7SJ85 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7SJ86 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7SK85 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7SL86 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7SL87 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7SS85 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7ST85 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V8.81","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7ST86 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V9.20","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7SX85 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V8.30","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7UM85 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7UT85 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7UT86 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7UT87 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7VE85 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 7VK87 (CP300)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 Communication Module ETH-BD-2FO","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V7.80","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIPROTEC 5 Compact 7SX800 (CP050)","vendor":"Siemens","versions":[{"lessThan":"V9.30","status":"affected","version":"V8.70","versionType":"custom"}]}],"providerMetadata":{"dateUpdated":"2026-04-14T08:58:05.041Z","orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP"},"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-726834.html"}],"x_adpType":"supplier"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"An issue was discovered in Wind River VxWorks 6.9 and 7, that allows a specifically crafted packet sent by a Radius server, may cause Denial of Service during the IP Radius access procedure."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-11-25T00:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"url":"https://windriver.com"},{"url":"https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2022-38767"}]}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2022-38767","datePublished":"2022-11-25T00:00:00.000Z","dateReserved":"2022-08-25T00:00:00.000Z","dateUpdated":"2026-04-14T08:58:05.041Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2022-11-25 15:15:10","lastModifiedDate":"2026-04-14 10:16:25","problem_types":["NVD-CWE-noinfo","n/a","CWE-noinfo Not enough information"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9","versionEndExcluding":"6.9.4.12","matchCriteriaId":"2E27E761-92D8-4A67-8D23-213E0C7BFFC6"},{"vulnerable":true,"criteria":"cpe:2.3:o:windriver:vxworks:6.9.4.12:-:*:*:*:*:*:*","matchCriteriaId":"69674D4D-2848-46BA-9367-7AA85EE2CD99"},{"vulnerable":true,"criteria":"cpe:2.3:o:windriver:vxworks:6.9.4.12:rolling_cumulative_patch_layer1:*:*:*:*:*:*","matchCriteriaId":"1052B8F5-1BC4-46B6-A8F1-F1BF9A40DDAF"},{"vulnerable":true,"criteria":"cpe:2.3:o:windriver:vxworks:6.9.4.12:rolling_cumulative_patch_layer2:*:*:*:*:*:*","matchCriteriaId":"7AABF1E5-DA6B-462D-A047-EC843F94568E"},{"vulnerable":true,"criteria":"cpe:2.3:o:windriver:vxworks:6.9.4.12:rolling_cumulative_patch_layer3:*:*:*:*:*:*","matchCriteriaId":"4C6D5D36-9CD0-4F54-B486-2FA1ECDFA8A4"},{"vulnerable":true,"criteria":"cpe:2.3:o:windriver:vxworks:6.9.4.12:rolling_cumulative_patch_layer4:*:*:*:*:*:*","matchCriteriaId":"6D9DC783-9D1E-4478-83DF-CF38774B4CF3"},{"vulnerable":true,"criteria":"cpe:2.3:o:windriver:vxworks:6.9.4.12:rolling_cumulative_patch_layer5:*:*:*:*:*:*","matchCriteriaId":"AF75490C-3BC7-46C2-9FB6-BBA317185023"},{"vulnerable":true,"criteria":"cpe:2.3:o:windriver:vxworks:7.0:*:*:*:*:*:*:*","matchCriteriaId":"D4810B35-06F6-4971-BE87-A30B1CF58AA0"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"38767","Ordinal":"1","Title":"CVE-2022-38767","CVE":"CVE-2022-38767","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"38767","Ordinal":"1","NoteData":"An issue was discovered in Wind River VxWorks 6.9 and 7, that allows a specifically crafted packet sent by a Radius server, may cause Denial of Service during the IP Radius access procedure.","Type":"Description","Title":"CVE-2022-38767"}]}}}