Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
contiki-ng contiki-ng vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2018-16666
An issue exists in Contiki-NG up to and including 4.1. There is a stack-based buffer overflow in next_string in os/storage/antelope/aql-lexer.c while parsing AQL (parsing next string).
Contiki-ng Contiki-ng.
7.5
CVSSv3
CVE-2021-42146
An issue exists in Contiki-NG tinyDTLS through master branch 53a0d97. DTLS servers allow remote malicious users to reuse the same epoch number within two times the TCP maximum segment lifetime, which is prohibited in RFC6347. This vulnerability allows remote malicious users to ob...
Contiki-ng Tinydtls 2018-08-30
7.5
CVSSv3
CVE-2021-42145
An assertion failure discovered in in check_certificate_request() in Contiki-NG tinyDTLS through master branch 53a0d97 allows malicious users to cause a denial of service.
Contiki-ng Tinydtls
7.5
CVSSv3
CVE-2023-30546
Contiki-NG is an operating system for Internet of Things devices. An off-by-one error can be triggered in the Antelope database management system in the Contiki-NG operating system in versions 4.8 and prior. The problem exists in the Contiki File System (CFS) backend for the stor...
Contiki-ng Contiki-ng
7.5
CVSSv3
CVE-2022-35926
Contiki-NG is an open-source, cross-platform operating system for IoT devices. Because of insufficient validation of IPv6 neighbor discovery options in Contiki-NG, attackers can send neighbor solicitation packets that trigger an out-of-bounds read. The problem exists in the modul...
Contiki-ng Contiki-ng
7.5
CVSSv3
CVE-2021-21279
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions before 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (NS) messages. This type of attac...
Contiki-ng Contiki-ng
7.5
CVSSv3
CVE-2021-21257
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. The RPL-Classic and RPL-Lite implementations in the Contiki-NG operating system versions before 4.6 do not validate the address pointer in the RPL source routing header This makes it pos...
Contiki-ng Contiki-ng
7.5
CVSSv3
CVE-2020-24335
An issue exists in uIP up to and including 1.0, as used in Contiki and Contiki-NG. Domain name parsing lacks bounds checks, allowing an malicious user to corrupt memory with crafted DNS packets.
Uip Project Uip
7.5
CVSSv3
CVE-2020-13988
An issue exists in Contiki up to and including 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.
Contiki-ng Contiki-ng
7.5
CVSSv3
CVE-2019-9183
An issue exists in Contiki-NG up to and including 4.3 and Contiki up to and including 3.0. A buffer overflow is present due to an integer underflow during 6LoWPAN fragment processing in the face of truncated fragments in os/net/ipv6/sicslowpan.c. This results in accesses of unmap...
Contiki-ng Contiki-ng
Contiki-os Contiki
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »