RIOT-OS vulnerable to Packet Type Confusion during IPHC send
CVE-2023-24823

9.8CRITICAL

Key Information:

Vendor

Riot-os

Status
Vendor
CVE Published:
24 April 2023

What is CVE-2023-24823?

RIOT-OS, designed for Internet of Things devices, features a vulnerability in its network stack that processes 6LoWPAN frames. An attacker can exploit this vulnerability by sending a specially crafted frame, leading to a type confusion issue between the IPv6 extension headers and a UDP header. This design flaw occurs during the encoding process of the 6LoWPAN IPHC header, resulting in an out-of-bounds write in the packet buffer. Exploiting this issue can corrupt packets and metadata, potentially causing a denial of service. A determined attacker can manipulate the allocator metadata to write arbitrary data to specific locations, potentially enabling arbitrary code execution. To mitigate this risk, users are advised to upgrade to version 2022.10 or manually apply the relevant patches.

Affected Version(s)

RIOT < 2022.10

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.