Lucene search

K
cveGitHub_MCVE-2023-50927
HistoryFeb 14, 2024 - 8:15 p.m.

CVE-2023-50927

2024-02-1420:15:45
CWE-125
GitHub_M
web.nvd.nist.gov
20
contiki-ng
iot
security
vulnerability
rpl
operating system
update
patch

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

8.5

Confidence

High

EPSS

0

Percentile

9.0%

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An attacker can trigger out-of-bounds reads in the RPL-Lite implementation of the RPL protocol in the Contiki-NG operating system. This vulnerability is caused by insufficient control of the lengths for DIO and DAO messages, in particular when they contain RPL sub-option headers. The problem has been patched in Contiki-NG 4.9. Users are advised to upgrade. Users unable to upgrade should manually apply the code changes in PR #2484.

Affected configurations

Vulners
Vulnrichment
Node
contiki-ngcontiki-ng.Range<4.9
VendorProductVersionCPE
contiki-ngcontiki-ng.*cpe:2.3:o:contiki-ng:contiki-ng.:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "contiki-ng",
    "product": "contiki-ng",
    "versions": [
      {
        "version": "< 4.9",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

8.5

Confidence

High

EPSS

0

Percentile

9.0%

Related for CVE-2023-50927