The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-29998

CVE-2021-29998: VxWorks DHCP Buffer Overflow Vulnerability

CVE-2021-29998 is a heap overflow vulnerability in the DHCP client of Wind River VxWorks before version 6.5. This flaw can allow attackers to corrupt memory and compromise system integrity. Learn about technical details, affected versions, impact assessment, and mitigation strategies.

Published: February 25, 2026

CVE-2021-29998 Overview

CVE-2021-29998 is a heap overflow vulnerability discovered in Wind River VxWorks, a widely-deployed real-time operating system (RTOS) used in industrial control systems, medical devices, aerospace systems, and networking equipment. The vulnerability exists in the DHCP client component of VxWorks versions prior to 6.5, allowing remote attackers to potentially execute arbitrary code or cause denial of service conditions on affected devices.

This vulnerability is particularly concerning due to the widespread deployment of VxWorks in critical infrastructure and industrial environments. The DHCP client flaw can be exploited by an attacker who can send malicious DHCP responses to vulnerable devices on the same network segment, making it a significant threat to operational technology (OT) environments.

Critical Impact

Remote attackers can exploit the heap overflow in the DHCP client to achieve arbitrary code execution or cause system crashes on critical infrastructure devices running VxWorks, potentially disrupting industrial operations and safety systems.

Affected Products

  • Wind River VxWorks (versions prior to 6.5)
  • Siemens SCALANCE X-series industrial Ethernet switches (multiple models including X200, X201, X202, X204, X206, X208, X212, X216, X224, X300, X408, XF201, XF202, XF204, XF206, XF208)
  • Siemens RUGGEDCOM WIN Subscriber Station
  • Siemens SIMATIC RF 181 EIP and RF 182C RFID readers
  • Siemens SINAMICS Perfect Harmony GH180 drives

Discovery Timeline

  • 2021-04-13 - CVE-2021-29998 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-29998

Vulnerability Analysis

The vulnerability resides in the DHCP client implementation within VxWorks RTOS. When the DHCP client processes incoming DHCP responses, it fails to properly validate the size of certain fields before copying data into heap-allocated buffers. This improper bounds checking allows an attacker to craft malicious DHCP packets that overflow the heap buffer, corrupting adjacent memory structures.

In embedded and RTOS environments like VxWorks, heap overflows can be particularly dangerous as they may allow attackers to overwrite function pointers, control structures, or other critical data. Given that VxWorks is used in safety-critical systems, successful exploitation could have severe consequences ranging from device crashes to complete system compromise.

The vulnerability is classified as CWE-787 (Out-of-bounds Write), which describes the condition where software writes data past the end, or before the beginning, of the intended buffer.

Root Cause

The root cause is insufficient validation of DHCP option field lengths in the VxWorks DHCP client implementation. When processing DHCP OFFER or DHCP ACK messages from a server, the client allocates heap memory based on expected field sizes but fails to verify that incoming data conforms to these boundaries before copying. This allows oversized DHCP options to overflow the allocated heap buffer.

Attack Vector

The attack requires network access to the same broadcast domain as the target device. An attacker can exploit this vulnerability by:

  1. Positioning themselves on the same network segment as a vulnerable VxWorks device
  2. Setting up a rogue DHCP server or using ARP spoofing to intercept legitimate DHCP traffic
  3. Sending crafted DHCP responses containing oversized option fields
  4. Triggering the heap overflow when the vulnerable DHCP client processes the malicious response

The attack can be executed during device boot when it requests a DHCP lease, or when an existing lease expires and the device attempts to renew. In industrial environments, this could be triggered by restarting network equipment or during planned maintenance windows.

Since the vulnerability is in the DHCP client, it requires no authentication and can be exploited remotely over the network. The attacker needs to be able to send DHCP packets to the target, which typically means being on the same Layer 2 network segment or having control of network infrastructure.

Detection Methods for CVE-2021-29998

Indicators of Compromise

  • Unexpected DHCP traffic from unauthorized sources on industrial network segments
  • Unusual DHCP packets with abnormally large option fields or malformed structures
  • Device crashes or reboots coinciding with DHCP lease renewal periods
  • Memory corruption errors or unexpected behavior on VxWorks-based devices

Detection Strategies

  • Deploy network intrusion detection systems (NIDS) to monitor for malformed DHCP packets with anomalous option lengths
  • Implement deep packet inspection on network segments containing VxWorks devices to identify suspicious DHCP server responses
  • Configure DHCP snooping on managed switches to prevent rogue DHCP servers from responding to clients
  • Monitor device logs and health telemetry for unexpected reboots or memory-related errors

Monitoring Recommendations

  • Establish baseline DHCP traffic patterns and alert on deviations in industrial OT networks
  • Implement continuous monitoring of firmware versions across all VxWorks-based devices in the environment
  • Deploy SentinelOne Singularity for IoT/OT visibility into embedded device behavior and network anomalies
  • Configure centralized logging for all network infrastructure events, particularly DHCP-related activities

How to Mitigate CVE-2021-29998

Immediate Actions Required

  • Conduct an asset inventory to identify all VxWorks-based devices running versions prior to 6.5
  • Apply vendor firmware updates from Wind River and affected device manufacturers such as Siemens as soon as available
  • Implement network segmentation to isolate vulnerable devices from untrusted network segments
  • Enable DHCP snooping and port security on network switches to prevent rogue DHCP server attacks
  • Consider using static IP addressing for critical infrastructure devices where DHCP is not essential

Patch Information

Wind River has released security updates addressing this vulnerability. Organizations should consult the Wind River Security Notices for VxWorks-specific patches. For Siemens industrial equipment, refer to Siemens Security Advisory SSA-560465 and Siemens Security Advisory SSA-910883 for firmware updates for affected SCALANCE, RUGGEDCOM, SIMATIC, and SINAMICS products. Additionally, CISA has published ICSA-21-194-12 Advisory with coordinated guidance for industrial control system operators.

Workarounds

  • Configure static IP addresses on critical VxWorks devices to eliminate dependency on DHCP
  • Implement strict network segmentation using VLANs and firewalls to isolate industrial devices from potential attackers
  • Enable DHCP snooping on all managed switches to ensure only authorized DHCP servers can respond to client requests
  • Deploy network access control (NAC) solutions to prevent unauthorized devices from connecting to sensitive network segments
bash
# Example: Enable DHCP snooping on Cisco switches to mitigate rogue DHCP attacks
configure terminal
ip dhcp snooping
ip dhcp snooping vlan 100
interface GigabitEthernet0/1
  description Trusted DHCP Server Port
  ip dhcp snooping trust
interface range GigabitEthernet0/2-24
  description Untrusted Client Ports
  ip dhcp snooping limit rate 10
end
write memory

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechWindriver Vxworks

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability0.60%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-787
  • Technical References
  • Siemens Security Advisory SSA-560465

  • Siemens Security Advisory SSA-910883

  • CISA ICSA-21-194-12 Advisory
  • Vendor Resources
  • Wind River Security Notices
  • Related CVEs
  • CVE-2022-23937: Wind River VxWorks Buffer Overflow Flaw

  • CVE-2020-35198: Wind River VxWorks Buffer Overflow Flaw

  • CVE-2020-28895: VxWorks Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English