Lucene search

K
EclipseCalifornium

4 matches found

CVE
CVE
added 2022/11/10 12:15 a.m.143 views

CVE-2022-39368

Eclipse Californium is a Java implementation of RFC7252 - Constrained Application Protocol for IoT Cloud services. In versions prior to 3.7.0, and 2.7.4, Californium is vulnerable to a Denial of Service. Failing handshakes don't cleanup counters for throttling, causing the threshold to be reached w...

8.2CVSS7.9AI score0.00075EPSS
CVE
CVE
added 2022/07/29 2:15 p.m.77 views

CVE-2022-2576

In Eclipse Californium version 2.0.0 to 2.7.2 and 3.0.0-3.5.0 a DTLS resumption handshake falls back to a DTLS full handshake on a parameter mismatch without using a HelloVerifyRequest. Especially, if used with certificate based cipher suites, that results in message amplification (DDoS other peers...

7.5CVSS7.3AI score0.00229EPSS
CVE
CVE
added 2021/02/03 4:15 p.m.47 views

CVE-2020-27222

In Eclipse Californium version 2.3.0 to 2.6.0, the certificate based (x509 and RPK) DTLS handshakes accidentally fails, because the DTLS server side sticks to a wrong internal state. That wrong internal state is set by a previous certificate based DTLS handshake failure with TLS parameter mismatch....

7.5CVSS7.3AI score0.00226EPSS
CVE
CVE
added 2021/08/20 5:15 p.m.39 views

CVE-2021-34433

In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes accidentally succeeds without verifying the server side's signature on the client side, if that signature is not included in the server's ServerKeyExchange.

7.5CVSS7.4AI score0.00048EPSS