First published: Wed Oct 09 2019(Updated: )
In RIOT 2019.07, the MQTT-SN implementation (asymcute) mishandles errors occurring during a read operation on a UDP socket. The receive loop ends. This allows an attacker (via a large packet) to prevent a RIOT MQTT-SN client from working until the device is restarted.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Riot-os Riot | =2019.07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17389 is considered to have a medium severity due to potential denial of service caused by large packet attacks.
To fix CVE-2019-17389, update your RIOT OS to a later version than 2019.07 that addresses the MQTT-SN implementation.
CVE-2019-17389 affects RIOT OS version 2019.07 specifically.
Devices may become unresponsive and require a restart, indicating an exploit of CVE-2019-17389.
Yes, CVE-2019-17389 can be exploited remotely if an attacker sends a large packet to the vulnerable MQTT-SN client.