Lucene search

K
cve[email protected]CVE-2022-35927
HistoryAug 04, 2022 - 9:15 p.m.

CVE-2022-35927

2022-08-0421:15:08
CWE-120
web.nvd.nist.gov
34
6
contiki-ng
iot
operating system
cve-2022-35927
rpl-classic
buffer overflow
security vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.2%

Contiki-NG is an open-source, cross-platform operating system for IoT devices. In the RPL-Classic routing protocol implementation in the Contiki-NG operating system, an incoming DODAG Information Option (DIO) control message can contain a prefix information option with a length parameter. The value of the length parameter is not validated, however, and it is possible to cause a buffer overflow when copying the prefix in the set_ip_from_prefix function. This vulnerability affects anyone running a Contiki-NG version prior to 4.7 that can receive RPL DIO messages from external parties. To obtain a patched version, users should upgrade to Contiki-NG 4.7 or later. There are no workarounds for this issue.

Affected configurations

Vulners
NVD
Node
contiki-ngcontiki-ng.Range<4.7
VendorProductVersionCPE
contiki\-ngcontiki\-ng\.*cpe:2.3:o:contiki\-ng:contiki\-ng\.:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "contiki-ng",
    "vendor": "contiki-ng",
    "versions": [
      {
        "status": "affected",
        "version": "< 4.7"
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.2%

Related for CVE-2022-35927