Denial of Service (DoS) Affecting contiki-ng/contiki-ng package, versions [,4.6)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-CONTIKINGCONTIKING-6137931
  • published22 Dec 2023
  • disclosed18 Jun 2021
  • creditUnknown

Introduced: 18 Jun 2021

CVE-2021-21279  (opens in a new tab)
CWE-835  (opens in a new tab)

How to fix?

Upgrade contiki-ng/contiki-ng to version 4.6 or higher.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS). Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions prior to 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (NS) messages. This type of attack can effectively shut down the operation of the system because of the cooperative scheduling used for the main parts of Contiki-NG and its communication stack. The problem has been patched in Contiki-NG 4.6. Users can apply the patch for this vulnerability out-of-band as a workaround.

References

CVSS Scores

version 3.1