First published: Fri Jun 18 2021(Updated: )
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In versions prior to 4.5, buffer overflow can be triggered by an input packet when using either of Contiki-NG's two RPL implementations in source-routing mode. The problem has been patched in Contiki-NG 4.5. Users can apply the patch for this vulnerability out-of-band as a workaround.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Contiki-ng Contiki-ng | <4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21282 is a buffer overflow vulnerability in Contiki-NG prior to version 4.5, which can be triggered by an input packet when using either of Contiki-NG's two RPL implementations in source-routing mode.
CVE-2021-21282 has a severity rating of 9.8 out of 10, which is considered critical.
Contiki-NG versions prior to 4.5 are affected by CVE-2021-21282.
The CVE-2021-21282 vulnerability can be fixed by updating to Contiki-NG version 4.5 or later.
The Common Weakness Enumeration (CWE) IDs associated with CVE-2021-21282 are CWE-119 and CWE-120.