Lucene search

K

Contiki-ng Security Vulnerabilities

cve
cve

CVE-2018-1000804

contiki-ng version 4 contains a Buffer Overflow vulnerability in AQL (Antelope Query Language) database engine that can result in Attacker can perform Remote Code Execution on device using Contiki-NG operating system. This attack appear to be exploitable via Attacker must be able to run malicious A...

9.8CVSS

9.7AI Score

0.003EPSS

2022-10-03 04:21 PM
23
cve
cve

CVE-2018-19417

An issue was discovered in the MQTT server in Contiki-NG before 4.2. The function parse_publish_vhdr() that parses MQTT PUBLISH messages with a variable length header uses memcpy to input data into a fixed size buffer. The allocated buffer can fit only MQTT_MAX_TOPIC_LENGTH (default 64) bytes, and ...

10CVSS

8.7AI Score

0.011EPSS

2018-11-21 08:29 PM
49
cve
cve

CVE-2018-20579

Contiki-NG before 4.2 has a stack-based buffer overflow in the push function in os/lib/json/jsonparse.c that allows an out-of-bounds write of an '{' or '[' character.

7.1CVSS

7.2AI Score

0.0004EPSS

2022-10-03 04:22 PM
19
cve
cve

CVE-2019-8359

An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. An out of bounds write is present in the data section during 6LoWPAN fragment re-assembly in the face of forged fragment offsets in os/net/ipv6/sicslowpan.c.

9.8CVSS

9.3AI Score

0.002EPSS

2020-04-23 03:15 PM
19
cve
cve

CVE-2019-9183

An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. A buffer overflow is present due to an integer underflow during 6LoWPAN fragment processing in the face of truncated fragments in os/net/ipv6/sicslowpan.c. This results in accesses of unmapped memory, crashing the applicatio...

7.5CVSS

7.5AI Score

0.002EPSS

2020-04-23 03:15 PM
20
cve
cve

CVE-2020-12140

A buffer overflow in os/net/mac/ble/ble-l2cap.c in the BLE stack in Contiki-NG 4.4 and earlier allows an attacker to execute arbitrary code via malicious L2CAP frames.

8.8CVSS

9AI Score

0.001EPSS

2021-12-07 07:15 PM
17
cve
cve

CVE-2020-12141

An out-of-bounds read in the SNMP stack in Contiki-NG 4.4 and earlier allows an attacker to cause a denial of service and potentially disclose information via crafted SNMP packets to snmp_ber_decode_string_len_buffer in os/net/app-layer/snmp/snmp-ber.c.

9.1CVSS

8.6AI Score

0.002EPSS

2021-10-19 04:15 PM
18
cve
cve

CVE-2020-13988

An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.

7.5CVSS

7.5AI Score

0.001EPSS

2020-12-11 10:15 PM
88
4
cve
cve

CVE-2020-14934

Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP agent. The function parsing the received SNMP request does not verify the input message's requested variables against the capacity of the internal SNMP engine buffer. If the number of variables in the request exceeds the al...

9.8CVSS

9.5AI Score

0.003EPSS

2020-08-18 05:15 PM
29
cve
cve

CVE-2020-14935

Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP bulk get request response encoding function. The function parsing the received SNMP request does not verify the input message's requested variables against the capacity of the internal SNMP engine buffer. When a bulk get re...

9.8CVSS

9.7AI Score

0.006EPSS

2020-08-18 05:15 PM
22
cve
cve

CVE-2020-14936

Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP agent. Functions parsing the OIDs in SNMP requests lack sufficient allocated target-buffer capacity verification when writing parsed OID values. The function snmp_oid_decode_oid() may overwrite memory areas beyond the provi...

9.8CVSS

9.5AI Score

0.002EPSS

2020-08-18 05:15 PM
23
cve
cve

CVE-2020-14937

Memory access out of buffer boundaries issues was discovered in Contiki-NG 4.4 through 4.5, in the SNMP BER encoder/decoder. The length of provided input/output buffers is insufficiently verified during the encoding and decoding of data. This may lead to out-of-bounds buffer read or write access in...

9.1CVSS

9.1AI Score

0.005EPSS

2020-08-18 04:15 PM
16
cve
cve

CVE-2020-24336

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This ...

9.8CVSS

9.7AI Score

0.042EPSS

2020-12-11 11:15 PM
114
cve
cve

CVE-2020-27634

In Contiki 4.5, TCP ISNs are improperly random.

9.1CVSS

9.1AI Score

0.001EPSS

2023-10-10 05:15 PM
12
cve
cve

CVE-2021-21257

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. The RPL-Classic and RPL-Lite implementations in the Contiki-NG operating system versions prior to 4.6 do not validate the address pointer in the RPL source routing header This makes it possible for an atta...

8.2CVSS

7.4AI Score

0.001EPSS

2021-06-18 09:15 PM
59
2
cve
cve

CVE-2021-21279

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions prior to 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (NS) messages. This type of attack can effectively...

7.5CVSS

7.4AI Score

0.001EPSS

2021-06-18 09:15 PM
161
cve
cve

CVE-2021-21280

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. It is possible to cause an out-of-bounds write in versions of Contiki-NG prior to 4.6 when transmitting a 6LoWPAN packet with a chain of extension headers. Unfortunately, the written header is not checked ...

9.8CVSS

9.3AI Score

0.004EPSS

2021-06-18 09:15 PM
60
cve
cve

CVE-2021-21281

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. A buffer overflow vulnerability exists in Contiki-NG versions prior to 4.6. After establishing a TCP socket using the tcp-socket library, it is possible for the remote end to send a packet with a data offs...

9.8CVSS

9.5AI Score

0.003EPSS

2021-06-18 09:15 PM
58
3
cve
cve

CVE-2021-21282

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In versions prior to 4.5, buffer overflow can be triggered by an input packet when using either of Contiki-NG's two RPL implementations in source-routing mode. The problem has been patched in Contiki-NG 4....

9.8CVSS

9.5AI Score

0.003EPSS

2021-06-18 08:15 PM
60
cve
cve

CVE-2021-21410

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be triggered by 6LoWPAN packets sent to devices running Contiki-NG 4.6 and prior. The IPv6 header decompression function (<code>uncompress_hdr_iphc</code>) does not perform prope...

9.1CVSS

8.9AI Score

0.002EPSS

2021-06-18 09:15 PM
59
2
cve
cve

CVE-2021-32771

Contiki-NG is an open-source, cross-platform operating system for IoT devices. In affected versions it is possible to cause a buffer overflow when copying an IPv6 address prefix in the RPL-Classic implementation in Contiki-NG. In order to trigger the vulnerability, the Contiki-NG system must have j...

8.1CVSS

8.1AI Score

0.001EPSS

2022-08-04 09:15 PM
34
11
cve
cve

CVE-2022-35926

Contiki-NG is an open-source, cross-platform operating system for IoT devices. Because of insufficient validation of IPv6 neighbor discovery options in Contiki-NG, attackers can send neighbor solicitation packets that trigger an out-of-bounds read. The problem exists in the module os/net/ipv6/uip-n...

7.5CVSS

7.4AI Score

0.001EPSS

2022-08-04 09:15 PM
35
3
cve
cve

CVE-2022-35927

Contiki-NG is an open-source, cross-platform operating system for IoT devices. In the RPL-Classic routing protocol implementation in the Contiki-NG operating system, an incoming DODAG Information Option (DIO) control message can contain a prefix information option with a length parameter. The value...

9.8CVSS

9.4AI Score

0.001EPSS

2022-08-04 09:15 PM
34
6
cve
cve

CVE-2022-36052

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in Contiki-NG may cast a UDP header structure at a certain offset in a packet buffer. The code does not check whether the packet buffer is large enough to fit a full UDP header ...

8.8CVSS

8.6AI Score

0.001EPSS

2022-09-01 12:15 PM
37
7
cve
cve

CVE-2022-36053

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The low-power IPv6 network stack of Contiki-NG has a buffer module (os/net/ipv6/uipbuf.c) that processes IPv6 extension headers in incoming data packets. As part of this processing, the function uipbuf_ge...

8.8CVSS

8.5AI Score

0.001EPSS

2022-09-01 12:15 PM
27
6
cve
cve

CVE-2022-36054

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in the Contiki-NG operating system (file os/net/ipv6/sicslowpan.c) contains an input function that processes incoming packets and copies them into a packet buffer. Because of a ...

8.8CVSS

8.6AI Score

0.001EPSS

2022-09-01 12:15 PM
28
8
cve
cve

CVE-2022-41873

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to 4.9 are vulnerable to an Out-of-bounds read. While processing the L2CAP protocol, the Bluetooth Low Energy stack of Contiki-NG needs to map an incoming channel ID to its metadata structu...

5.4CVSS

5.5AI Score

0.001EPSS

2022-11-11 04:15 AM
26
5
cve
cve

CVE-2022-41972

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to 4.9 contain a NULL Pointer Dereference in BLE L2CAP module. The Contiki-NG operating system for IoT devices contains a Bluetooth Low Energy stack. An attacker can inject a packet in this...

6.5CVSS

6.4AI Score

0.001EPSS

2022-12-16 06:15 PM
28
cve
cve

CVE-2023-23609

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to and including 4.8 are vulnerable to an out-of-bounds write that can occur in the BLE-L2CAP module. The Bluetooth Low Energy - Logical Link Control and Adaptation Layer Protocol (BLE-L2CA...

8.2CVSS

7.5AI Score

0.0005EPSS

2023-01-26 09:18 PM
27
cve
cve

CVE-2023-28116

Contiki-NG is an open-source, cross-platform operating system for internet of things (IoT) devices. In versions 4.8 and prior, an out-of-bounds write can occur in the BLE L2CAP module of the Contiki-NG operating system. The network stack of Contiki-NG uses a global buffer (packetbuf) for processing...

9.8CVSS

9.7AI Score

0.001EPSS

2023-03-17 10:15 PM
23
cve
cve

CVE-2023-30546

Contiki-NG is an operating system for Internet of Things devices. An off-by-one error can be triggered in the Antelope database management system in the Contiki-NG operating system in versions 4.8 and prior. The problem exists in the Contiki File System (CFS) backend for the storage of data (file o...

9.8CVSS

7.4AI Score

0.001EPSS

2023-04-26 07:15 PM
14
cve
cve

CVE-2023-31129

The Contiki-NG operating system versions 4.8 and prior can be triggered to dereference a NULL pointer in the message handling code for IPv6 router solicitiations. Contiki-NG contains an implementation of IPv6 Neighbor Discovery (ND) in the module os/net/ipv6/uip-nd6.c. The ND protocol includes a me...

9.8CVSS

9.2AI Score

0.003EPSS

2023-05-08 09:15 PM
89
cve
cve

CVE-2023-34100

Contiki-NG is an open-source, cross-platform operating system for IoT devices. When reading the TCP MSS option value from an incoming packet, the Contiki-NG OS does not verify that certain buffer indices to read from are within the bounds of the IPv6 packet buffer, uip_buf. In particular, there is ...

7.3CVSS

6.5AI Score

0.001EPSS

2023-06-09 06:15 PM
12
cve
cve

CVE-2023-34101

Contiki-NG is an operating system for internet of things devices. In version 4.8 and prior, when processing ICMP DAO packets in the dao_input_storing function, the Contiki-NG OS does not verify that the packet buffer is big enough to contain the bytes it needs before accessing them. Up to 16 bytes ...

9.1CVSS

9.1AI Score

0.001EPSS

2023-06-14 03:15 PM
13
cve
cve

CVE-2023-37281

Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when processing the various IPv6 header fields during IPHC header decompression, Contiki-NG confirms the received packet buffer contains enough data as needed for that field. But no similar check is done be...

5.3CVSS

5.3AI Score

0.0005EPSS

2023-09-15 08:15 PM
64
cve
cve

CVE-2023-37459

Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when a packet is received, the Contiki-NG network stack attempts to start the periodic TCP timer if it is a TCP packet with the SYN flag set. But the implementation does not first verify that a full TCP hea...

5.3CVSS

5.3AI Score

0.0005EPSS

2023-09-15 08:15 PM
64