Vulnerability Description
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. It is possible to cause an out-of-bounds write in versions of Contiki-NG prior to 4.6 when transmitting a 6LoWPAN packet with a chain of extension headers. Unfortunately, the written header is not checked to be within the available space, thereby making it possible to write outside the buffer. The problem has been patched in Contiki-NG 4.6. Users can apply the patch for this vulnerability out-of-band as a workaround.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Contiki-Ng | Contiki-Ng | < 4.6 |
Related Weaknesses (CWE)
References
- https://github.com/contiki-ng/contiki-ng/pull/1409PatchThird Party Advisory
- https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-r768-hrhf-v592ExploitPatchThird Party Advisory
- https://github.com/contiki-ng/contiki-ng/pull/1409PatchThird Party Advisory
- https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-r768-hrhf-v592ExploitPatchThird Party Advisory
FAQ
What is CVE-2021-21280?
CVE-2021-21280 is a vulnerability with a CVSS score of 8.6 (HIGH). Contiki-NG is an open-source, cross-platform operating system for internet of things devices. It is possible to cause an out-of-bounds write in versions of Contiki-NG prior to 4.6 when transmitting a ...
How severe is CVE-2021-21280?
CVE-2021-21280 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-21280?
Check the references section above for vendor advisories and patch information. Affected products include: Contiki-Ng Contiki-Ng.