First published: Fri Dec 11 2020(Updated: )
An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Contiki-os Contiki-os | <=3.0 | |
Multiple (open source) picoTCP-NG, Version 1.7.0 and prior | ||
Multiple (open source) picoTCP (EOL), Version 1.7.0 and prior | ||
Multiple (open source) FNET, Version 4.6.3 | ||
Multiple (open source) Nut/Net, Version 5.1 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25111 is a vulnerability in the IPv6 stack in Contiki through version 3.0, which allows for Denial-of-Service and potential Remote Code Execution.
The severity of CVE-2020-25111 is critical with a CVSS score of 9.8.
CVE-2020-25111 affects Contiki OS through version 3.0, allowing for Denial-of-Service and potential Remote Code Execution.
To fix CVE-2020-25111, it is recommended to upgrade to a version of Contiki OS that includes a fix for this vulnerability.
For more information about CVE-2020-25111, you can refer to the following sources: [US-CERT Advisory](https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01) and [CERT Vulnerability Note](https://www.kb.cert.org/vuls/id/815128).