Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions prior to 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (NS) messages. This type of attack can effectively shut down the operation of the system because of the cooperative scheduling used for the main parts of Contiki-NG and its communication stack. The problem has been patched in Contiki-NG 4.6. Users can apply the patch for this vulnerability out-of-band as a workaround.
References
Link | Resource |
---|---|
https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-rr5j-j8m8-fc4f | Third Party Advisory |
Configurations
History
22 Jun 2021, 19:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 7.8
v3 : 7.5 |
References | (CONFIRM) https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-rr5j-j8m8-fc4f - Third Party Advisory | |
CWE | CWE-835 |
18 Jun 2021, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-18 21:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-21279
Mitre link : CVE-2021-21279
CVE.ORG link : CVE-2021-21279
JSON object : View
Products Affected
contiki-ng
- contiki-ng
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')