First published: Tue Oct 10 2023(Updated: )
In Contiki 4.5, TCP ISNs are improperly random.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
open-iscsi | ||
CycloneTCP | ||
Multiple NDKTCPIP, Version 2.25 and prior | ||
butok FNET | ||
Contiki OS | ||
uC/TCP-IP | ||
Contiki-NG | ||
uIP (EOL) | ||
altran picoTCP-NG | ||
picoTCP | ||
MPLAB Net | ||
Multiple Nucleus NET | ||
Multiple Nucleus ReadyStart for ARM, MIPS, and PPC | ||
Naranjascontocados | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27634 is a vulnerability in Contiki 4.5 where TCP ISNs are improperly random.
CVE-2020-27634 has a severity rating of 9.1 (critical).
CVE-2020-27634 affects Contiki-ng Contiki-ng 4.5 by improperly randomizing TCP ISNs.
To fix CVE-2020-27634, update to a patched version of Contiki-ng Contiki-ng 4.5 or apply any available security patches.
Yes, you can find references for CVE-2020-27634 at the following links: [Link 1](https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01), [Link 2](https://www.forescout.com), [Link 3](https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/).