ID

VAR-202102-1510


CVE

CVE-2020-27634


TITLE

Contiki-NG  Vulnerability in using inadequate random values in

Trust: 0.8

sources: JVNDB: JVNDB-2020-018055

DESCRIPTION

In Contiki 4.5, TCP ISNs are improperly random. Contiki-NG There is a vulnerability in the use of inadequate random values.Information may be obtained and information may be tampered with. Contiki is an open-source, cross-platform operating system for IoT (Internet of Things) devices. Contiki-NG is an open-source cross-platform operating system for next-generation IoT (Internet of Things) devices. A security feature issue vulnerability exists in uIP, Contiki-OS, and Contiki-NG that could allow an attacker to spoof or destroy a TCP connection

Trust: 2.16

sources: NVD: CVE-2020-27634 // JVNDB: JVNDB-2020-018055 // CNNVD: CNNVD-202102-1072

AFFECTED PRODUCTS

vendor:contiki ngmodel:contiki-ngscope:eqversion:4.5

Trust: 1.8

vendor:contiki ngmodel:contiki-ngscope: - version: -

Trust: 0.8

vendor:contiki ngmodel:contiki-ngscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-018055 // NVD: CVE-2020-27634

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-27634
value: CRITICAL

Trust: 1.0

NVD: CVE-2020-27634
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202102-1072
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-27634
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2020-27634
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-018055 // CNNVD: CNNVD-202102-1072 // NVD: CVE-2020-27634

PROBLEMTYPE DATA

problemtype:CWE-330

Trust: 1.0

problemtype:Insufficient use of random values (CWE-330) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-018055 // NVD: CVE-2020-27634

TYPE

security feature problem

Trust: 0.6

sources: CNNVD: CNNVD-202102-1072

PATCH

title:Repair measures for other vulnerabilities in many productsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142359

Trust: 0.6

sources: CNNVD: CNNVD-202102-1072

EXTERNAL IDS

db:NVDid:CVE-2020-27634

Trust: 3.2

db:ICS CERTid:ICSA-21-042-01

Trust: 2.4

db:JVNid:JVNVU90767599

Trust: 0.8

db:JVNDBid:JVNDB-2020-018055

Trust: 0.8

db:AUSCERTid:ESB-2021.0538

Trust: 0.6

db:CNNVDid:CNNVD-202102-1072

Trust: 0.6

sources: JVNDB: JVNDB-2020-018055 // CNNVD: CNNVD-202102-1072 // NVD: CVE-2020-27634

REFERENCES

url:https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01

Trust: 1.8

url:https://www.forescout.com

Trust: 1.8

url:https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/

Trust: 1.8

url:https://jvn.jp/vu/jvnvu90767599/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-27634

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2021.0538

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-042-01

Trust: 0.6

sources: JVNDB: JVNDB-2020-018055 // CNNVD: CNNVD-202102-1072 // NVD: CVE-2020-27634

CREDITS

and Amine Amri of Forescout Research Labs reported these vulnerabilities to CISA., Stanislav Dashevskyi,Daniel dos Santos, Jos Wetzels

Trust: 0.6

sources: CNNVD: CNNVD-202102-1072

SOURCES

db:JVNDBid:JVNDB-2020-018055
db:CNNVDid:CNNVD-202102-1072
db:NVDid:CVE-2020-27634

LAST UPDATE DATE

2024-08-14T13:04:37.669000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-018055date:2023-12-25T03:08:00
db:CNNVDid:CNNVD-202102-1072date:2022-04-29T00:00:00
db:NVDid:CVE-2020-27634date:2023-10-13T15:12:30.383

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-018055date:2023-12-25T00:00:00
db:CNNVDid:CNNVD-202102-1072date:2021-02-11T00:00:00
db:NVDid:CVE-2020-27634date:2023-10-10T17:15:10.657