First published: Tue Sep 24 2019(Updated: )
RIOT 2019.07 contains a NULL pointer dereference in the MQTT-SN implementation (asymcute), potentially allowing an attacker to crash a network node running RIOT. This requires spoofing an MQTT server response. To do so, the attacker needs to know the MQTT MsgID of a pending MQTT protocol message and the ephemeral port used by RIOT's MQTT implementation. Additionally, the server IP address is required for spoofing the packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Riot-os Riot | =2019.07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16754 is a vulnerability in the RIOT operating system that allows an attacker to crash a network node by exploiting a NULL pointer dereference in the MQTT-SN implementation.
CVE-2019-16754 has a severity value of 7.5 (high).
CVE-2019-16754 affects RIOT 2019.07, potentially allowing an attacker to crash a network node running RIOT by spoofing an MQTT server response.
To exploit CVE-2019-16754, an attacker needs to know the MQTT MsgID of a pending MQTT protocol message and spoof an MQTT server response.
Yes, a fix for CVE-2019-16754 has been implemented in RIOT-OS. It is recommended to update to the latest version to mitigate the vulnerability.