CVE-2021-29998

9.8 CRITICAL

📋 TL;DR

CVE-2021-29998 is a heap overflow vulnerability in the DHCP client of Wind River VxWorks operating system. This allows remote attackers to execute arbitrary code or cause denial of service by sending specially crafted DHCP packets. Systems running VxWorks versions before 6.5 with DHCP client enabled are affected.

💻 Affected Systems

Products:
  • Wind River VxWorks
Versions: All versions before 6.5
Operating Systems: VxWorks RTOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with DHCP client functionality enabled. Many industrial control systems and embedded devices use VxWorks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, allowing attackers to take control of affected devices.

🟠

Likely Case

Denial of service causing system crashes or instability, potentially disrupting critical operations.

🟢

If Mitigated

Limited impact if network segmentation prevents external DHCP traffic from reaching vulnerable systems.

🌐 Internet-Facing: HIGH - DHCP clients typically listen on network interfaces and can be exploited remotely without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised systems on the same network segment can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malicious DHCP packets to vulnerable systems. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: VxWorks 6.5 and later

Vendor Advisory: https://support2.windriver.com/index.php?page=security-notices

Restart Required: Yes

Instructions:

1. Contact Wind River for patches for specific VxWorks versions. 2. Apply the provided patches. 3. Reboot affected systems. 4. Verify patch installation.

🔧 Temporary Workarounds

Disable DHCP Client

all

Configure systems to use static IP addresses instead of DHCP

# Configure static IP in VxWorks network settings
# Set IP address, netmask, gateway manually

Network Segmentation

all

Isolate VxWorks systems from untrusted networks

# Configure firewall rules to block DHCP traffic (ports 67/68) from untrusted sources

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate VxWorks systems
  • Deploy network intrusion detection systems to monitor for DHCP exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check VxWorks version and verify if DHCP client is enabled. Versions before 6.5 are vulnerable.

Check Version:

versionShow() or uname -a in VxWorks shell

Verify Fix Applied:

Verify system is running VxWorks 6.5 or later, or confirm patch installation from vendor.

📡 Detection & Monitoring

Log Indicators:

  • DHCP client crashes
  • Memory corruption errors
  • System reboots without clear cause

Network Indicators:

  • Unusual DHCP traffic patterns
  • DHCP packets with malformed options

SIEM Query:

search DHCP traffic with suspicious option fields or from untrusted sources

🔗 References

📤 Share & Export