
CVE-2023-29001 – Uncontrolled recursion due to insufficient validation of the IPv6 source routing header in Contiki-NG
https://notcve.org/view.php?id=CVE-2023-29001
27 Nov 2024 — Contiki-NG is an open-source, cross-platform operating system for IoT devices. The Contiki-NG operating system processes source routing headers (SRH) in its two alternative RPL protocol implementations. The IPv6 implementation uses the results of this processing to determine whether an incoming packet should be forwarded to another host. Because of missing validation of the resulting next-hop address, an uncontrolled recursion may occur in the tcpip_ipv6_output function in the os/net/ipv6/tcpip.c module whe... • https://github.com/contiki-ng/contiki-ng/pull/2264 • CWE-674: Uncontrolled Recursion •

CVE-2024-41125 – Out-of-bounds read in SNMP when decoding a string in Contiki-NG
https://notcve.org/view.php?id=CVE-2024-41125
27 Nov 2024 — Contiki-NG is an open-source, cross-platform operating system for IoT devices. An out-of-bounds read of 1 byte can be triggered when sending a packet to a device running the Contiki-NG operating system with SNMP enabled. The SNMP module is disabled in the default Contiki-NG configuration. The vulnerability exists in the os/net/app-layer/snmp/snmp-ber.c module, where the function snmp_ber_decode_string_len_buffer decodes the string length from a received SNMP packet. In one place, one byte is read from the b... • https://github.com/contiki-ng/contiki-ng/pull/2936 • CWE-125: Out-of-bounds Read •

CVE-2024-41126 – Out-of-bounds read when decoding SNMP messages in Contiki-NG
https://notcve.org/view.php?id=CVE-2024-41126
27 Nov 2024 — Contiki-NG is an open-source, cross-platform operating system for IoT devices. An out-of-bounds read of 1 byte can be triggered when sending a packet to a device running the Contiki-NG operating system with SNMP enabled. The SNMP module is disabled in the default Contiki-NG configuration. The vulnerability exists in the os/net/app-layer/snmp/snmp-message.c module, where the snmp_message_decode function fails to check the boundary of the message buffer when reading a byte from it immediately after decoding a... • https://github.com/contiki-ng/contiki-ng/pull/2937 • CWE-125: Out-of-bounds Read •

CVE-2024-47181 – Unaligned memory access in RPL option processing in Contiki-NG
https://notcve.org/view.php?id=CVE-2024-47181
27 Nov 2024 — Contiki-NG is an open-source, cross-platform operating system for IoT devices. An unaligned memory access can be triggered in the two RPL implementations of the Contiki-NG operating system. The problem can occur when either one of these RPL implementations is enabled and connected to an RPL instance. If an IPv6 packet containing an odd number of padded bytes before the RPL option, it can cause the rpl_ext_header_hbh_update function to read a 16-bit integer from an odd address. The impact of this unaligned r... • https://github.com/contiki-ng/contiki-ng/pull/2962 • CWE-704: Incorrect Type Conversion or Cast •

CVE-2023-50926 – Unvalidated DIO prefix info length in RPL-Lite in Contiki-NG
https://notcve.org/view.php?id=CVE-2023-50926
14 Feb 2024 — Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be caused by an incoming DIO message when using the RPL-Lite implementation in the Contiki-NG operating system. More specifically, the prefix information of the DIO message contains a field that specifies the length of an IPv6 address prefix. The value of this field is not validated, which means that an attacker can set a value that is longer than the maximum prefix length. Subsequently, ... • https://github.com/contiki-ng/contiki-ng/pull/2721 • CWE-125: Out-of-bounds Read •

CVE-2023-50927 – Insufficient boundary checks for DIO and DAO messages in RPL-Lite in Contiki-NG
https://notcve.org/view.php?id=CVE-2023-50927
14 Feb 2024 — Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An attacker can trigger out-of-bounds reads in the RPL-Lite implementation of the RPL protocol in the Contiki-NG operating system. This vulnerability is caused by insufficient control of the lengths for DIO and DAO messages, in particular when they contain RPL sub-option headers. The problem has been patched in Contiki-NG 4.9. Users are advised to upgrade. • https://github.com/contiki-ng/contiki-ng/pull/2484 • CWE-125: Out-of-bounds Read •

CVE-2023-48229 – Out-of-bounds write in the radio driver for Contiki-NG nRF platforms
https://notcve.org/view.php?id=CVE-2023-48229
14 Feb 2024 — Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds write exists in the driver for IEEE 802.15.4 radios on nRF platforms in the Contiki-NG operating system. The problem is triggered when parsing radio frames in the `read_frame` function in the `arch/cpu/nrf/net/nrf-ieee-driver-arch.c` module. More specifically, the `read_frame` function performs an incomplete validation of the payload length of the packet, which is a value that can be set by an ext... • https://github.com/contiki-ng/contiki-ng/pull/2741 • CWE-787: Out-of-bounds Write •

CVE-2020-27634
https://notcve.org/view.php?id=CVE-2020-27634
10 Oct 2023 — In Contiki 4.5, TCP ISNs are improperly random. En Contiki 4.5, los ISN de TCP son incorrectamente aleatorios. • https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01 • CWE-330: Use of Insufficiently Random Values •

CVE-2023-37459 – Out-of-bounds read when processing a received IPv6 packet
https://notcve.org/view.php?id=CVE-2023-37459
15 Sep 2023 — Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when a packet is received, the Contiki-NG network stack attempts to start the periodic TCP timer if it is a TCP packet with the SYN flag set. But the implementation does not first verify that a full TCP header has been received. Specifically, the implementation attempts to access the flags field from the TCP buffer in the following conditional expression in the `check_for_tcp_syn` function. For this reason, an attac... • https://github.com/contiki-ng/contiki-ng/pull/2510 • CWE-125: Out-of-bounds Read •

CVE-2023-37281 – Out-of-bounds read during IPHC address decompression
https://notcve.org/view.php?id=CVE-2023-37281
15 Sep 2023 — Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when processing the various IPv6 header fields during IPHC header decompression, Contiki-NG confirms the received packet buffer contains enough data as needed for that field. But no similar check is done before decompressing the IPv6 address. Therefore, up to 16 bytes can be read out of bounds on the line with the statement `memcpy(&ipaddr->u8[16 - postcount], iphc_ptr, postcount);`. The value of `postcount` depends... • https://github.com/contiki-ng/contiki-ng/pull/2509 • CWE-125: Out-of-bounds Read •