Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-55658 | Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An attacker can trigger out-of-bounds reads in the RPL-Lite implementation of the RPL protocol in the Contiki-NG operating system. This vulnerability is caused by insufficient control of the lengths for DIO and DAO messages, in particular when they contain RPL sub-option headers. The problem has been patched in Contiki-NG 4.9. Users are advised to upgrade. Users unable to upgrade should manually apply the code changes in PR #2484. |
Thu, 24 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:contiki-ng:contiki-ng:4.9:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Tue, 07 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Contiki-ng
Contiki-ng contiki-ng |
|
| CPEs | cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Contiki-ng
Contiki-ng contiki-ng |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-24T15:15:35.777Z
Reserved: 2023-12-15T20:57:23.174Z
Link: CVE-2023-50927
Updated: 2024-08-02T22:23:43.859Z
Status : Analyzed
Published: 2024-02-14T20:15:45.367
Modified: 2025-01-07T14:53:39.337
Link: CVE-2023-50927
No data.
OpenCVE Enrichment
No data.
EUVD