Description
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An attacker can trigger out-of-bounds reads in the RPL-Lite implementation of the RPL protocol in the Contiki-NG operating system. This vulnerability is caused by insufficient control of the lengths for DIO and DAO messages, in particular when they contain RPL sub-option headers. The problem has been patched in Contiki-NG 4.9. Users are advised to upgrade. Users unable to upgrade should manually apply the code changes in PR #2484.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-9423-rgj4-wjfw
Issue Tracking x_refsource_misc
https://github.com/contiki-ng/contiki-ng/pull/2484
Scores
CVSS v3
8.6
EPSS
0.0032
EPSS Percentile
54.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (1)
contiki-ng/contiki-ng
< 4.9
Published
Feb 14, 2024
Tracked Since
Feb 18, 2026