CVE-2025-26500

4.6 MEDIUM

📋 TL;DR

A denial-of-service vulnerability in Wind River VxWorks 7 allows attackers to crash systems by sending specially crafted USB packets. This affects VxWorks 7 installations from version 22.06 through 24.03, potentially impacting industrial control systems, medical devices, aerospace systems, and other embedded devices using this real-time operating system.

💻 Affected Systems

Products:
  • Wind River VxWorks 7
Versions: 22.06 through 24.03
Operating Systems: VxWorks 7
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with USB functionality enabled. Industrial control systems, medical devices, and embedded systems using affected VxWorks versions are most at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability requiring physical reboot, potentially disrupting critical operations in industrial, medical, or aerospace systems.

🟠

Likely Case

Temporary system crash or freeze requiring reboot, causing operational downtime.

🟢

If Mitigated

Limited impact with proper USB port controls and monitoring in place.

🌐 Internet-Facing: LOW - Requires physical USB access or USB-over-network capabilities.
🏢 Internal Only: MEDIUM - Physical access to USB ports or compromised USB devices could trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Requires sending crafted USB packets but no authentication needed.

Exploitation requires physical USB access or ability to send USB packets to the system. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Wind River support for specific patch versions

Vendor Advisory: https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2025-26500

Restart Required: Yes

Instructions:

1. Contact Wind River support for appropriate patch. 2. Apply patch according to vendor instructions. 3. Reboot system. 4. Verify patch installation.

🔧 Temporary Workarounds

Disable USB ports

all

Physically disable or logically restrict USB port access to prevent malicious USB packets.

VxWorks-specific USB disable commands vary by configuration

Implement USB device whitelisting

all

Only allow known, trusted USB devices to connect to the system.

Configure USB device filtering in VxWorks security settings

🧯 If You Can't Patch

  • Physically secure USB ports with port locks or epoxy to prevent unauthorized access
  • Implement strict physical security controls around devices with USB connectivity

🔍 How to Verify

Check if Vulnerable:

Check VxWorks version: if between 22.06 and 24.03 and USB functionality is enabled, system is vulnerable.

Check Version:

uname -a or VxWorks-specific version command

Verify Fix Applied:

Verify patch installation through Wind River patch management tools and confirm version is no longer in vulnerable range.

📡 Detection & Monitoring

Log Indicators:

  • System crash logs
  • USB error messages
  • Unexpected system reboots

Network Indicators:

  • USB-over-network traffic patterns if applicable

SIEM Query:

Search for: 'system crash' OR 'USB error' OR 'unexpected reboot' on VxWorks systems

🔗 References

📤 Share & Export