Lucene search

K
cve[email protected]CVE-2023-50927
HistoryFeb 14, 2024 - 8:15 p.m.

CVE-2023-50927

2024-02-1420:15:45
CWE-125
web.nvd.nist.gov
13
contiki-ng
iot
security
vulnerability
rpl
operating system
update
patch

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An attacker can trigger out-of-bounds reads in the RPL-Lite implementation of the RPL protocol in the Contiki-NG operating system. This vulnerability is caused by insufficient control of the lengths for DIO and DAO messages, in particular when they contain RPL sub-option headers. The problem has been patched in Contiki-NG 4.9. Users are advised to upgrade. Users unable to upgrade should manually apply the code changes in PR #2484.

Affected configurations

Vulners
Node
contiki-ngcontiki-ng.Range<4.9
VendorProductVersionCPE
contiki\-ngcontiki\-ng\.*cpe:2.3:o:contiki\-ng:contiki\-ng\.:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "contiki-ng",
    "product": "contiki-ng",
    "versions": [
      {
        "version": "< 4.9",
        "status": "affected"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2023-50927