First published: Tue Oct 10 2023(Updated: )
In Contiki 4.5, TCP ISNs are improperly random.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Contiki-ng Contiki-ng | =4.5 | |
Multiple Nut/Net, Version 5.1 and prior | ||
Multiple CycloneTCP, Version 1.9.6 and prior | ||
Multiple NDKTCPIP, Version 2.25 and prior | ||
Multiple FNET, Version 4.6.3 | ||
Multiple uIP-Contiki-OS (end-of-life [EOL]), Version 3.0 and prior | ||
Multiple uC/TCP-IP (EOL), Version 3.6.0 and prior | ||
Multiple uIP-Contiki-NG, Version 4.5 and prior | ||
Multiple uIP (EOL), Version 1.0 and prior | ||
Multiple picoTCP-NG, Version 1.7.0 and prior | ||
Multiple picoTCP (EOL), Version 1.7.0 and prior | ||
Multiple MPLAB Net, Version 3.6.1 and prior | ||
Multiple Nucleus NET, All versions prior to Version 5.2 | ||
Multiple Nucleus ReadyStart for ARM, MIPS, and PPC, All versions prior to Version 2012.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27634 is a vulnerability in Contiki 4.5 where TCP ISNs are improperly random.
CVE-2020-27634 has a severity rating of 9.1 (critical).
CVE-2020-27634 affects Contiki-ng Contiki-ng 4.5 by improperly randomizing TCP ISNs.
To fix CVE-2020-27634, update to a patched version of Contiki-ng Contiki-ng 4.5 or apply any available security patches.
Yes, you can find references for CVE-2020-27634 at the following links: [Link 1](https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01), [Link 2](https://www.forescout.com), [Link 3](https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/).