ID

VAR-202209-0044


CVE

CVE-2022-36052


TITLE

Contiki-NG  Out-of-bounds read vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-016128

DESCRIPTION

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in Contiki-NG may cast a UDP header structure at a certain offset in a packet buffer. The code does not check whether the packet buffer is large enough to fit a full UDP header structure from the offset where the casting is made. Hence, it is possible to cause an out-of-bounds read beyond the packet buffer. The problem affects anyone running devices with Contiki-NG versions previous to 4.8, and which may receive 6LoWPAN packets from external parties. The problem has been patched in Contiki-NG version 4.8. Contiki-NG Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 2.25

sources: NVD: CVE-2022-36052 // JVNDB: JVNDB-2022-016128 // CNNVD: CNNVD-202209-021 // VULMON: CVE-2022-36052

AFFECTED PRODUCTS

vendor:contiki ngmodel:contiki-ngscope:ltversion:4.8

Trust: 1.0

vendor:contiki ngmodel:contiki-ngscope:eqversion: -

Trust: 0.8

vendor:contiki ngmodel:contiki-ngscope:eqversion:4.8

Trust: 0.8

vendor:contiki ngmodel:contiki-ngscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-016128 // NVD: CVE-2022-36052

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-36052
value: HIGH

Trust: 1.0

security-advisories@github.com: CVE-2022-36052
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-36052
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202209-021
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-36052
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

security-advisories@github.com: CVE-2022-36052
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 4.2
version: 3.1

Trust: 1.0

NVD: CVE-2022-36052
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-016128 // CNNVD: CNNVD-202209-021 // NVD: CVE-2022-36052 // NVD: CVE-2022-36052

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

problemtype:Out-of-bounds read (CWE-125) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-016128 // NVD: CVE-2022-36052

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202209-021

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202209-021

PATCH

title:Contiki-NG Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=206825

Trust: 0.6

sources: CNNVD: CNNVD-202209-021

EXTERNAL IDS

db:NVDid:CVE-2022-36052

Trust: 3.3

db:JVNDBid:JVNDB-2022-016128

Trust: 0.8

db:CNNVDid:CNNVD-202209-021

Trust: 0.6

db:VULMONid:CVE-2022-36052

Trust: 0.1

sources: VULMON: CVE-2022-36052 // JVNDB: JVNDB-2022-016128 // CNNVD: CNNVD-202209-021 // NVD: CVE-2022-36052

REFERENCES

url:https://github.com/contiki-ng/contiki-ng/pull/1648

Trust: 2.5

url:https://github.com/contiki-ng/contiki-ng/security/advisories/ghsa-vwr8-6mqv-x7f5

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-36052

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-36052/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-36052 // JVNDB: JVNDB-2022-016128 // CNNVD: CNNVD-202209-021 // NVD: CVE-2022-36052

SOURCES

db:VULMONid:CVE-2022-36052
db:JVNDBid:JVNDB-2022-016128
db:CNNVDid:CNNVD-202209-021
db:NVDid:CVE-2022-36052

LAST UPDATE DATE

2024-08-14T13:53:03.863000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-36052date:2022-09-01T00:00:00
db:JVNDBid:JVNDB-2022-016128date:2023-10-02T08:10:00
db:CNNVDid:CNNVD-202209-021date:2022-09-08T00:00:00
db:NVDid:CVE-2022-36052date:2022-09-07T17:09:30.643

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-36052date:2022-09-01T00:00:00
db:JVNDBid:JVNDB-2022-016128date:2023-10-02T00:00:00
db:CNNVDid:CNNVD-202209-021date:2022-09-01T00:00:00
db:NVDid:CVE-2022-36052date:2022-09-01T12:15:10.230