CVE-2024-47181
- EPSS 0.17%
- Published 27.11.2024 19:15:33
- Last modified 10.04.2025 14:49:56
Contiki-NG is an open-source, cross-platform operating system for IoT devices. An unaligned memory access can be triggered in the two RPL implementations of the Contiki-NG operating system. The problem can occur when either one of these RPL implement...
CVE-2024-41126
- EPSS 0.07%
- Published 27.11.2024 19:15:33
- Last modified 10.04.2025 14:54:59
Contiki-NG is an open-source, cross-platform operating system for IoT devices. An out-of-bounds read of 1 byte can be triggered when sending a packet to a device running the Contiki-NG operating system with SNMP enabled. The SNMP module is disabled i...
CVE-2024-41125
- EPSS 0.07%
- Published 27.11.2024 19:15:32
- Last modified 10.04.2025 14:55:43
Contiki-NG is an open-source, cross-platform operating system for IoT devices. An out-of-bounds read of 1 byte can be triggered when sending a packet to a device running the Contiki-NG operating system with SNMP enabled. The SNMP module is disabled i...
CVE-2023-29001
- EPSS 0.11%
- Published 27.11.2024 19:15:31
- Last modified 10.04.2025 14:58:31
Contiki-NG is an open-source, cross-platform operating system for IoT devices. The Contiki-NG operating system processes source routing headers (SRH) in its two alternative RPL protocol implementations. The IPv6 implementation uses the results of thi...
CVE-2023-50927
- EPSS 0.32%
- Published 14.02.2024 20:15:45
- Last modified 07.01.2025 14:53:39
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An attacker can trigger out-of-bounds reads in the RPL-Lite implementation of the RPL protocol in the Contiki-NG operating system. This vulnerability is ca...
CVE-2023-50926
- EPSS 0.34%
- Published 14.02.2024 20:15:45
- Last modified 06.01.2025 15:30:54
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be caused by an incoming DIO message when using the RPL-Lite implementation in the Contiki-NG operating system. More specifically...
CVE-2023-48229
- EPSS 0.43%
- Published 14.02.2024 19:15:08
- Last modified 06.01.2025 15:28:46
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds write exists in the driver for IEEE 802.15.4 radios on nRF platforms in the Contiki-NG operating system. The problem is triggered when par...
CVE-2020-27634
- EPSS 0.19%
- Published 10.10.2023 17:15:10
- Last modified 21.11.2024 05:21:33
In Contiki 4.5, TCP ISNs are improperly random.
CVE-2023-37281
- EPSS 0.15%
- Published 15.09.2023 20:15:08
- Last modified 21.11.2024 08:11:23
Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when processing the various IPv6 header fields during IPHC header decompression, Contiki-NG confirms the received packet buffer contains enough data as neede...
CVE-2023-37459
- EPSS 0.21%
- Published 15.09.2023 20:15:08
- Last modified 21.11.2024 08:11:44
Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when a packet is received, the Contiki-NG network stack attempts to start the periodic TCP timer if it is a TCP packet with the SYN flag set. But the impleme...