NULL Pointer Dereference Affecting riot-os/riot package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.12% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-RIOTOSRIOT-2365015
  • published26 Jan 2022
  • disclosed24 Sept 2019
  • creditUnknown

Introduced: 24 Sep 2019

CVE-2019-16754  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

There is no fixed version for riot-os/riot.

Overview

Affected versions of this package are vulnerable to NULL Pointer Dereference. RIOT 2019.07 contains a NULL pointer dereference in the MQTT-SN implementation (asymcute), potentially allowing an attacker to crash a network node running RIOT. This requires spoofing an MQTT server response. To do so, the attacker needs to know the MQTT MsgID of a pending MQTT protocol message and the ephemeral port used by RIOT's MQTT implementation. Additionally, the server IP address is required for spoofing the packet.

References

CVSS Scores

version 3.1