Lucene search

K

Contiki-ng. Security Vulnerabilities

cve
cve

CVE-2018-16663

An issue was discovered in Contiki-NG through 4.1. There is a stack-based buffer overflow in parse_relations in os/storage/antelope/aql-parser.c while parsing AQL (storage of relations).

7.8CVSS

7.8AI Score

0.0005EPSS

2018-09-07 05:29 PM
21
cve
cve

CVE-2018-16664

An issue was discovered in Contiki-NG through 4.1. There is a buffer overflow in lvm_set_type in os/storage/antelope/lvm.c while parsing AQL (lvm_set_op, lvm_set_relation, lvm_set_operand).

7CVSS

7.2AI Score

0.0005EPSS

2018-09-07 05:29 PM
22
cve
cve

CVE-2018-16665

An issue was discovered in Contiki-NG through 4.1. There is a buffer overflow while parsing AQL in lvm_shift_for_operator in os/storage/antelope/lvm.c.

6.1CVSS

6.5AI Score

0.0005EPSS

2018-09-07 05:29 PM
19
cve
cve

CVE-2018-16666

An issue was discovered in Contiki-NG through 4.1. There is a stack-based buffer overflow in next_string in os/storage/antelope/aql-lexer.c while parsing AQL (parsing next string).

7.8CVSS

7.8AI Score

0.0005EPSS

2018-09-07 05:29 PM
20
cve
cve

CVE-2018-16667

An issue was discovered in Contiki-NG through 4.1. There is a buffer over-read in lookup in os/storage/antelope/lvm.c while parsing AQL (lvm_register_variable, lvm_set_variable_value, create_intersection, create_union).

7CVSS

7AI Score

0.0005EPSS

2018-09-07 05:29 PM
18
cve
cve

CVE-2021-21257

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. The RPL-Classic and RPL-Lite implementations in the Contiki-NG operating system versions prior to 4.6 do not validate the address pointer in the RPL source routing header This makes it possible for an atta...

8.2CVSS

7.4AI Score

0.001EPSS

2021-06-18 09:15 PM
59
2
cve
cve

CVE-2021-21279

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions prior to 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (NS) messages. This type of attack can effectively...

7.5CVSS

7.4AI Score

0.001EPSS

2021-06-18 09:15 PM
161
cve
cve

CVE-2021-21280

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. It is possible to cause an out-of-bounds write in versions of Contiki-NG prior to 4.6 when transmitting a 6LoWPAN packet with a chain of extension headers. Unfortunately, the written header is not checked ...

9.8CVSS

9.3AI Score

0.004EPSS

2021-06-18 09:15 PM
60
cve
cve

CVE-2021-21281

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. A buffer overflow vulnerability exists in Contiki-NG versions prior to 4.6. After establishing a TCP socket using the tcp-socket library, it is possible for the remote end to send a packet with a data offs...

9.8CVSS

9.5AI Score

0.003EPSS

2021-06-18 09:15 PM
58
3
cve
cve

CVE-2021-21282

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In versions prior to 4.5, buffer overflow can be triggered by an input packet when using either of Contiki-NG's two RPL implementations in source-routing mode. The problem has been patched in Contiki-NG 4....

9.8CVSS

9.5AI Score

0.003EPSS

2021-06-18 08:15 PM
60
cve
cve

CVE-2021-21410

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be triggered by 6LoWPAN packets sent to devices running Contiki-NG 4.6 and prior. The IPv6 header decompression function (<code>uncompress_hdr_iphc</code>) does not perform prope...

9.1CVSS

8.9AI Score

0.002EPSS

2021-06-18 09:15 PM
59
2
cve
cve

CVE-2021-32771

Contiki-NG is an open-source, cross-platform operating system for IoT devices. In affected versions it is possible to cause a buffer overflow when copying an IPv6 address prefix in the RPL-Classic implementation in Contiki-NG. In order to trigger the vulnerability, the Contiki-NG system must have j...

8.1CVSS

8.1AI Score

0.001EPSS

2022-08-04 09:15 PM
34
11
cve
cve

CVE-2022-1341

An issue was discovered in in bwm-ng v0.6.2. An arbitrary null write exists in get_cmdln_options() function in src/options.c.

7.5CVSS

7.5AI Score

0.001EPSS

2022-04-18 05:15 PM
28
cve
cve

CVE-2022-35926

Contiki-NG is an open-source, cross-platform operating system for IoT devices. Because of insufficient validation of IPv6 neighbor discovery options in Contiki-NG, attackers can send neighbor solicitation packets that trigger an out-of-bounds read. The problem exists in the module os/net/ipv6/uip-n...

7.5CVSS

7.4AI Score

0.001EPSS

2022-08-04 09:15 PM
35
3
cve
cve

CVE-2022-35927

Contiki-NG is an open-source, cross-platform operating system for IoT devices. In the RPL-Classic routing protocol implementation in the Contiki-NG operating system, an incoming DODAG Information Option (DIO) control message can contain a prefix information option with a length parameter. The value...

9.8CVSS

9.4AI Score

0.001EPSS

2022-08-04 09:15 PM
34
6
cve
cve

CVE-2022-36052

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in Contiki-NG may cast a UDP header structure at a certain offset in a packet buffer. The code does not check whether the packet buffer is large enough to fit a full UDP header ...

8.8CVSS

8.6AI Score

0.001EPSS

2022-09-01 12:15 PM
37
7
cve
cve

CVE-2022-36053

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The low-power IPv6 network stack of Contiki-NG has a buffer module (os/net/ipv6/uipbuf.c) that processes IPv6 extension headers in incoming data packets. As part of this processing, the function uipbuf_ge...

8.8CVSS

8.5AI Score

0.001EPSS

2022-09-01 12:15 PM
27
6
cve
cve

CVE-2022-36054

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in the Contiki-NG operating system (file os/net/ipv6/sicslowpan.c) contains an input function that processes incoming packets and copies them into a packet buffer. Because of a ...

8.8CVSS

8.6AI Score

0.001EPSS

2022-09-01 12:15 PM
28
8
cve
cve

CVE-2022-41873

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to 4.9 are vulnerable to an Out-of-bounds read. While processing the L2CAP protocol, the Bluetooth Low Energy stack of Contiki-NG needs to map an incoming channel ID to its metadata structu...

5.4CVSS

5.5AI Score

0.001EPSS

2022-11-11 04:15 AM
26
5
cve
cve

CVE-2022-41972

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to 4.9 contain a NULL Pointer Dereference in BLE L2CAP module. The Contiki-NG operating system for IoT devices contains a Bluetooth Low Energy stack. An attacker can inject a packet in this...

6.5CVSS

6.4AI Score

0.001EPSS

2022-12-16 06:15 PM
28
cve
cve

CVE-2023-23609

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to and including 4.8 are vulnerable to an out-of-bounds write that can occur in the BLE-L2CAP module. The Bluetooth Low Energy - Logical Link Control and Adaptation Layer Protocol (BLE-L2CA...

8.2CVSS

7.5AI Score

0.0005EPSS

2023-01-26 09:18 PM
27
cve
cve

CVE-2023-28116

Contiki-NG is an open-source, cross-platform operating system for internet of things (IoT) devices. In versions 4.8 and prior, an out-of-bounds write can occur in the BLE L2CAP module of the Contiki-NG operating system. The network stack of Contiki-NG uses a global buffer (packetbuf) for processing...

9.8CVSS

9.7AI Score

0.001EPSS

2023-03-17 10:15 PM
23
cve
cve

CVE-2023-30546

Contiki-NG is an operating system for Internet of Things devices. An off-by-one error can be triggered in the Antelope database management system in the Contiki-NG operating system in versions 4.8 and prior. The problem exists in the Contiki File System (CFS) backend for the storage of data (file o...

9.8CVSS

7.4AI Score

0.001EPSS

2023-04-26 07:15 PM
14
cve
cve

CVE-2023-31129

The Contiki-NG operating system versions 4.8 and prior can be triggered to dereference a NULL pointer in the message handling code for IPv6 router solicitiations. Contiki-NG contains an implementation of IPv6 Neighbor Discovery (ND) in the module os/net/ipv6/uip-nd6.c. The ND protocol includes a me...

9.8CVSS

9.2AI Score

0.003EPSS

2023-05-08 09:15 PM
89
cve
cve

CVE-2023-34100

Contiki-NG is an open-source, cross-platform operating system for IoT devices. When reading the TCP MSS option value from an incoming packet, the Contiki-NG OS does not verify that certain buffer indices to read from are within the bounds of the IPv6 packet buffer, uip_buf. In particular, there is ...

7.3CVSS

6.5AI Score

0.001EPSS

2023-06-09 06:15 PM
12
cve
cve

CVE-2023-34101

Contiki-NG is an operating system for internet of things devices. In version 4.8 and prior, when processing ICMP DAO packets in the dao_input_storing function, the Contiki-NG OS does not verify that the packet buffer is big enough to contain the bytes it needs before accessing them. Up to 16 bytes ...

9.1CVSS

9.1AI Score

0.001EPSS

2023-06-14 03:15 PM
13
cve
cve

CVE-2023-37281

Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when processing the various IPv6 header fields during IPHC header decompression, Contiki-NG confirms the received packet buffer contains enough data as needed for that field. But no similar check is done be...

5.3CVSS

5.3AI Score

0.0005EPSS

2023-09-15 08:15 PM
64
cve
cve

CVE-2023-37459

Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when a packet is received, the Contiki-NG network stack attempts to start the periodic TCP timer if it is a TCP packet with the SYN flag set. But the implementation does not first verify that a full TCP hea...

5.3CVSS

5.3AI Score

0.0005EPSS

2023-09-15 08:15 PM
64
cve
cve

CVE-2023-48229

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds write exists in the driver for IEEE 802.15.4 radios on nRF platforms in the Contiki-NG operating system. The problem is triggered when parsing radio frames in the read_frame function in t...

7CVSS

7.1AI Score

0.0004EPSS

2024-02-14 07:15 PM
10
cve
cve

CVE-2023-50926

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be caused by an incoming DIO message when using the RPL-Lite implementation in the Contiki-NG operating system. More specifically, the prefix information of the DIO message conta...

7.5CVSS

7.3AI Score

0.0004EPSS

2024-02-14 08:15 PM
9
cve
cve

CVE-2023-50927

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An attacker can trigger out-of-bounds reads in the RPL-Lite implementation of the RPL protocol in the Contiki-NG operating system. This vulnerability is caused by insufficient control of the lengths for D...

8.6CVSS

8.5AI Score

0.0004EPSS

2024-02-14 08:15 PM
13