First published: Wed Jan 24 2024(Updated: )
Buffer over-read vulnerability in Contiki-NG tinyDTLS through master branch 53a0d97 allows attackers obtain sensitive information via crafted input to dtls_ccm_decrypt_message().
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Contiki-NG | <=2018-08-30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42144 is classified as a medium severity vulnerability due to the potential for sensitive information exposure.
To fix CVE-2021-42144, update to a version of Contiki-NG tinyDTLS that has addressed this buffer over-read vulnerability.
CVE-2021-42144 affects systems running Contiki-NG tinyDTLS versions up to and including 2018-08-30.
Yes, CVE-2021-42144 can be exploited remotely by attackers who send crafted input to trigger the buffer over-read.
The potential impacts of CVE-2021-42144 include unauthorized access to sensitive information processed by vulnerable instances of tinyDTLS.