Lucene search

K

Contiki Security Vulnerabilities

cve
cve

CVE-2023-50927

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An attacker can trigger out-of-bounds reads in the RPL-Lite implementation of the RPL protocol in the Contiki-NG operating system. This vulnerability is caused by insufficient control of the lengths for.....

8.6CVSS

8.5AI Score

0.0004EPSS

2024-02-14 08:15 PM
13
cve
cve

CVE-2023-50926

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be caused by an incoming DIO message when using the RPL-Lite implementation in the Contiki-NG operating system. More specifically, the prefix information of the DIO message...

7.5CVSS

7.3AI Score

0.0004EPSS

2024-02-14 08:15 PM
9
cve
cve

CVE-2023-48229

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds write exists in the driver for IEEE 802.15.4 radios on nRF platforms in the Contiki-NG operating system. The problem is triggered when parsing radio frames in the read_frame function in.....

7CVSS

7.1AI Score

0.0004EPSS

2024-02-14 07:15 PM
10
cve
cve

CVE-2021-42144

Buffer over-read vulnerability in Contiki-NG tinyDTLS through master branch 53a0d97 allows attackers obtain sensitive information via crafted input to...

9.8CVSS

8.9AI Score

0.001EPSS

2024-01-24 06:15 PM
4
cve
cve

CVE-2020-27634

In Contiki 4.5, TCP ISNs are improperly...

9.1CVSS

9.1AI Score

0.001EPSS

2023-10-10 05:15 PM
12
cve
cve

CVE-2023-37459

Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when a packet is received, the Contiki-NG network stack attempts to start the periodic TCP timer if it is a TCP packet with the SYN flag set. But the implementation does not first verify that a full TCP...

5.3CVSS

5.3AI Score

0.0005EPSS

2023-09-15 08:15 PM
64
cve
cve

CVE-2023-37281

Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when processing the various IPv6 header fields during IPHC header decompression, Contiki-NG confirms the received packet buffer contains enough data as needed for that field. But no similar check is done...

5.3CVSS

5.3AI Score

0.0005EPSS

2023-09-15 08:15 PM
64
cve
cve

CVE-2023-34101

Contiki-NG is an operating system for internet of things devices. In version 4.8 and prior, when processing ICMP DAO packets in the dao_input_storing function, the Contiki-NG OS does not verify that the packet buffer is big enough to contain the bytes it needs before accessing them. Up to 16 bytes....

9.1CVSS

9.1AI Score

0.001EPSS

2023-06-14 03:15 PM
13
cve
cve

CVE-2023-34100

Contiki-NG is an open-source, cross-platform operating system for IoT devices. When reading the TCP MSS option value from an incoming packet, the Contiki-NG OS does not verify that certain buffer indices to read from are within the bounds of the IPv6 packet buffer, uip_buf. In particular, there is....

7.3CVSS

6.5AI Score

0.001EPSS

2023-06-09 06:15 PM
12
cve
cve

CVE-2023-31129

The Contiki-NG operating system versions 4.8 and prior can be triggered to dereference a NULL pointer in the message handling code for IPv6 router solicitiations. Contiki-NG contains an implementation of IPv6 Neighbor Discovery (ND) in the module os/net/ipv6/uip-nd6.c. The ND protocol includes a...

9.8CVSS

9.2AI Score

0.003EPSS

2023-05-08 09:15 PM
89
cve
cve

CVE-2023-30546

Contiki-NG is an operating system for Internet of Things devices. An off-by-one error can be triggered in the Antelope database management system in the Contiki-NG operating system in versions 4.8 and prior. The problem exists in the Contiki File System (CFS) backend for the storage of data (file.....

9.8CVSS

7.4AI Score

0.001EPSS

2023-04-26 07:15 PM
14
cve
cve

CVE-2023-28116

Contiki-NG is an open-source, cross-platform operating system for internet of things (IoT) devices. In versions 4.8 and prior, an out-of-bounds write can occur in the BLE L2CAP module of the Contiki-NG operating system. The network stack of Contiki-NG uses a global buffer (packetbuf) for...

9.8CVSS

9.7AI Score

0.001EPSS

2023-03-17 10:15 PM
23
cve
cve

CVE-2023-23609

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to and including 4.8 are vulnerable to an out-of-bounds write that can occur in the BLE-L2CAP module. The Bluetooth Low Energy - Logical Link Control and Adaptation Layer Protocol...

8.2CVSS

7.5AI Score

0.0005EPSS

2023-01-26 09:18 PM
27
cve
cve

CVE-2022-41972

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to 4.9 contain a NULL Pointer Dereference in BLE L2CAP module. The Contiki-NG operating system for IoT devices contains a Bluetooth Low Energy stack. An attacker can inject a packet in...

6.5CVSS

6.4AI Score

0.001EPSS

2022-12-16 06:15 PM
28
cve
cve

CVE-2022-41873

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to 4.9 are vulnerable to an Out-of-bounds read. While processing the L2CAP protocol, the Bluetooth Low Energy stack of Contiki-NG needs to map an incoming channel ID to its metadata...

5.4CVSS

5.5AI Score

0.001EPSS

2022-11-11 04:15 AM
26
5
cve
cve

CVE-2018-20579

Contiki-NG before 4.2 has a stack-based buffer overflow in the push function in os/lib/json/jsonparse.c that allows an out-of-bounds write of an '{' or '['...

7.1CVSS

7.2AI Score

0.0004EPSS

2022-10-03 04:22 PM
19
cve
cve

CVE-2018-1000804

contiki-ng version 4 contains a Buffer Overflow vulnerability in AQL (Antelope Query Language) database engine that can result in Attacker can perform Remote Code Execution on device using Contiki-NG operating system. This attack appear to be exploitable via Attacker must be able to run malicious.....

9.8CVSS

9.7AI Score

0.003EPSS

2022-10-03 04:21 PM
23
cve
cve

CVE-2022-36054

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in the Contiki-NG operating system (file os/net/ipv6/sicslowpan.c) contains an input function that processes incoming packets and copies them into a packet buffer. Because of a....

8.8CVSS

8.6AI Score

0.001EPSS

2022-09-01 12:15 PM
28
8
cve
cve

CVE-2022-36053

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The low-power IPv6 network stack of Contiki-NG has a buffer module (os/net/ipv6/uipbuf.c) that processes IPv6 extension headers in incoming data packets. As part of this processing, the function...

8.8CVSS

8.5AI Score

0.001EPSS

2022-09-01 12:15 PM
27
6
cve
cve

CVE-2022-36052

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in Contiki-NG may cast a UDP header structure at a certain offset in a packet buffer. The code does not check whether the packet buffer is large enough to fit a full UDP header....

8.8CVSS

8.6AI Score

0.001EPSS

2022-09-01 12:15 PM
37
7
cve
cve

CVE-2022-35927

Contiki-NG is an open-source, cross-platform operating system for IoT devices. In the RPL-Classic routing protocol implementation in the Contiki-NG operating system, an incoming DODAG Information Option (DIO) control message can contain a prefix information option with a length parameter. The...

9.8CVSS

9.4AI Score

0.001EPSS

2022-08-04 09:15 PM
34
6
cve
cve

CVE-2022-35926

Contiki-NG is an open-source, cross-platform operating system for IoT devices. Because of insufficient validation of IPv6 neighbor discovery options in Contiki-NG, attackers can send neighbor solicitation packets that trigger an out-of-bounds read. The problem exists in the module...

7.5CVSS

7.4AI Score

0.001EPSS

2022-08-04 09:15 PM
35
3
cve
cve

CVE-2021-32771

Contiki-NG is an open-source, cross-platform operating system for IoT devices. In affected versions it is possible to cause a buffer overflow when copying an IPv6 address prefix in the RPL-Classic implementation in Contiki-NG. In order to trigger the vulnerability, the Contiki-NG system must have.....

8.1CVSS

8.1AI Score

0.001EPSS

2022-08-04 09:15 PM
34
11
cve
cve

CVE-2020-12140

A buffer overflow in os/net/mac/ble/ble-l2cap.c in the BLE stack in Contiki-NG 4.4 and earlier allows an attacker to execute arbitrary code via malicious L2CAP...

8.8CVSS

9AI Score

0.001EPSS

2021-12-07 07:15 PM
17
cve
cve

CVE-2020-12141

An out-of-bounds read in the SNMP stack in Contiki-NG 4.4 and earlier allows an attacker to cause a denial of service and potentially disclose information via crafted SNMP packets to snmp_ber_decode_string_len_buffer in...

9.1CVSS

8.6AI Score

0.002EPSS

2021-10-19 04:15 PM
18
cve
cve

CVE-2021-40523

In Contiki 3.0, Telnet option negotiation is mishandled. During negotiation between a server and a client, the server may fail to give the WILL/WONT or DO/DONT response for DO and WILL commands because of improper handling of exception condition, which leads to property violations and denial of...

7.5CVSS

7.8AI Score

0.001EPSS

2021-09-05 07:15 PM
22
cve
cve

CVE-2021-38386

In Contiki 3.0, a buffer overflow in the Telnet service allows remote attackers to cause a denial of service because the ls command is mishandled when a directory has many files with long...

7.5CVSS

7.7AI Score

0.002EPSS

2021-08-10 07:15 PM
17
4
cve
cve

CVE-2021-38387

In Contiki 3.0, a Telnet server that silently quits (before disconnection with clients) leads to connected clients entering an infinite loop and waiting forever, which may cause excessive CPU...

7.5CVSS

7.4AI Score

0.001EPSS

2021-08-10 07:15 PM
19
4
cve
cve

CVE-2021-38311

In Contiki 3.0, potential nonterminating acknowledgment loops exist in the Telnet service. When the negotiated options are already disabled, servers still respond to DONT and WONT requests with WONT or DONT commands, which may lead to infinite acknowledgment loops, denial of service, and excessive....

7.5CVSS

7.5AI Score

0.001EPSS

2021-08-09 10:15 PM
31
cve
cve

CVE-2021-21410

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be triggered by 6LoWPAN packets sent to devices running Contiki-NG 4.6 and prior. The IPv6 header decompression function (uncompress_hdr_iphc) does not perform proper boundary...

9.1CVSS

8.9AI Score

0.002EPSS

2021-06-18 09:15 PM
59
2
cve
cve

CVE-2021-21279

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions prior to 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (NS) messages. This type of attack can...

7.5CVSS

7.4AI Score

0.001EPSS

2021-06-18 09:15 PM
161
cve
cve

CVE-2021-21257

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. The RPL-Classic and RPL-Lite implementations in the Contiki-NG operating system versions prior to 4.6 do not validate the address pointer in the RPL source routing header This makes it possible for an...

8.2CVSS

7.4AI Score

0.001EPSS

2021-06-18 09:15 PM
59
2
cve
cve

CVE-2021-21280

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. It is possible to cause an out-of-bounds write in versions of Contiki-NG prior to 4.6 when transmitting a 6LoWPAN packet with a chain of extension headers. Unfortunately, the written header is not checked....

9.8CVSS

9.3AI Score

0.004EPSS

2021-06-18 09:15 PM
60
cve
cve

CVE-2021-21281

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. A buffer overflow vulnerability exists in Contiki-NG versions prior to 4.6. After establishing a TCP socket using the tcp-socket library, it is possible for the remote end to send a packet with a data...

9.8CVSS

9.5AI Score

0.003EPSS

2021-06-18 09:15 PM
58
3
cve
cve

CVE-2021-21282

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In versions prior to 4.5, buffer overflow can be triggered by an input packet when using either of Contiki-NG's two RPL implementations in source-routing mode. The problem has been patched in Contiki-NG...

9.8CVSS

9.5AI Score

0.003EPSS

2021-06-18 08:15 PM
60
cve
cve

CVE-2021-28362

An issue was discovered in Contiki through 3.0. When sending an ICMPv6 error message because of invalid extension header options in an incoming IPv6 packet, there is an attempt to remove the RPL extension headers. Because the packet length and the extension header length are unchecked (with...

7.5CVSS

8.1AI Score

0.001EPSS

2021-03-24 02:15 PM
40
cve
cve

CVE-2020-24335

An issue was discovered in uIP through 1.0, as used in Contiki and Contiki-NG. Domain name parsing lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS...

7.5CVSS

7.5AI Score

0.003EPSS

2021-02-02 07:15 AM
41
cve
cve

CVE-2020-25111

An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo...

9.8CVSS

9.4AI Score

0.589EPSS

2020-12-11 11:15 PM
49
4
cve
cve

CVE-2020-25112

An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo...

9.8CVSS

9.4AI Score

0.589EPSS

2020-12-11 11:15 PM
56
cve
cve

CVE-2020-17440

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that domain names present in the DNS responses have '\0' termination. This results in errors when calculating the offset of the pointer that jumps over domain.....

7.5CVSS

7.5AI Score

0.001EPSS

2020-12-11 11:15 PM
50
cve
cve

CVE-2020-24336

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This....

9.8CVSS

9.7AI Score

0.042EPSS

2020-12-11 11:15 PM
114
cve
cve

CVE-2020-24334

The code that processes DNS responses in uIP through 1.0, as used in Contiki and Contiki-NG, does not check whether the number of responses specified in the DNS packet header corresponds to the response data available in the DNS packet, leading to an out-of-bounds read and Denial-of-Service in...

8.2CVSS

8.1AI Score

0.001EPSS

2020-12-11 11:15 PM
42
cve
cve

CVE-2020-17437

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by...

8.2CVSS

7.9AI Score

0.002EPSS

2020-12-11 11:15 PM
72
6
cve
cve

CVE-2020-17438

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By...

9.8CVSS

9.8AI Score

0.005EPSS

2020-12-11 11:15 PM
47
2
cve
cve

CVE-2020-17439

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that the incoming DNS replies match outgoing DNS queries in newdata() in resolv.c. Also, arbitrary DNS replies are parsed if there was any outgoing DNS query...

8.3CVSS

8.2AI Score

0.001EPSS

2020-12-11 11:15 PM
43
cve
cve

CVE-2020-13987

An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in...

7.5CVSS

7.5AI Score

0.002EPSS

2020-12-11 10:15 PM
81
8
cve
cve

CVE-2020-13984

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in...

7.5CVSS

7.9AI Score

0.001EPSS

2020-12-11 10:15 PM
37
1
cve
cve

CVE-2020-13988

An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in...

7.5CVSS

7.5AI Score

0.001EPSS

2020-12-11 10:15 PM
88
4
cve
cve

CVE-2020-13985

An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in...

7.5CVSS

8.1AI Score

0.001EPSS

2020-12-11 10:15 PM
43
cve
cve

CVE-2020-13986

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in...

7.5CVSS

7.9AI Score

0.001EPSS

2020-12-11 10:15 PM
38
2
Total number of security vulnerabilities64