Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-32771: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in contiki-ng contiki-ng

0
Medium
Published: Thu Aug 04 2022 (08/04/2022, 20:25:16 UTC)
Source: CVE
Vendor/Project: contiki-ng
Product: contiki-ng

Description

Contiki-NG is an open-source, cross-platform operating system for IoT devices. In affected versions it is possible to cause a buffer overflow when copying an IPv6 address prefix in the RPL-Classic implementation in Contiki-NG. In order to trigger the vulnerability, the Contiki-NG system must have joined an RPL DODAG. After that, an attacker can send a DAO packet with a Target option that contains a prefix length larger than 128 bits. The problem was fixed after the release of Contiki-NG 4.7. Users unable to upgrade may apply the patch in Contiki-NG PR #1615.

AI-Powered Analysis

AILast updated: 06/23/2025, 01:50:16 UTC

Technical Analysis

CVE-2021-32771 is a medium-severity vulnerability classified under CWE-120, which refers to a classic buffer overflow due to improper bounds checking during buffer copy operations. This vulnerability affects Contiki-NG, an open-source, cross-platform operating system widely used in Internet of Things (IoT) devices, particularly those implementing IPv6 networking and RPL (Routing Protocol for Low-Power and Lossy Networks). The flaw exists in the RPL-Classic implementation within Contiki-NG versions prior to 4.8. Specifically, when a Contiki-NG device has joined an RPL DODAG (Destination-Oriented Directed Acyclic Graph), an attacker can send a DAO (Destination Advertisement Object) packet containing a Target option with a prefix length exceeding 128 bits. Since IPv6 addresses are 128 bits in length, this malformed prefix length causes a buffer overflow during the copying of the IPv6 address prefix. This unchecked buffer copy can lead to memory corruption, potentially allowing an attacker to execute arbitrary code, cause a denial of service (DoS) through system crashes, or disrupt network routing functionality. The vulnerability requires the device to be part of an RPL network and reachable by an attacker capable of sending crafted DAO packets. The issue was resolved in Contiki-NG version 4.8, and a patch is available via Contiki-NG pull request #1615 for users unable to upgrade immediately. There are no known exploits in the wild as of the publication date, but the vulnerability presents a significant risk due to the nature of buffer overflows and the critical role of RPL in IoT network routing.

Potential Impact

For European organizations deploying IoT devices running Contiki-NG, especially in critical infrastructure sectors such as smart cities, industrial automation, energy management, and healthcare, this vulnerability poses a risk of network disruption and potential device compromise. Exploitation could lead to denial of service conditions in IoT networks, affecting availability and reliability of services. In worst-case scenarios, attackers might achieve remote code execution, compromising device integrity and confidentiality of data transmitted over the network. Given the increasing adoption of IPv6 and RPL in constrained IoT environments across Europe, the vulnerability could be leveraged to disrupt large-scale IoT deployments. This is particularly concerning for organizations relying on IoT for operational technology (OT) environments where safety and continuous operation are critical. The attack vector requires network access to the RPL DODAG, so exposure depends on network segmentation and device accessibility. However, once exploited, the impact could cascade through interconnected IoT systems, affecting broader organizational operations.

Mitigation Recommendations

1. Upgrade all Contiki-NG deployments to version 4.8 or later, which contains the official fix for this vulnerability. 2. For environments where immediate upgrade is not feasible, apply the patch provided in Contiki-NG pull request #1615 to address the buffer overflow. 3. Implement strict network segmentation and access controls to limit exposure of RPL networks to untrusted or external sources, reducing the attack surface. 4. Monitor network traffic for anomalous DAO packets with unusual prefix lengths or malformed RPL control messages, using specialized IoT network monitoring tools. 5. Employ intrusion detection systems (IDS) capable of parsing RPL protocol traffic to detect and alert on suspicious activity targeting RPL DODAGs. 6. Conduct regular security audits and firmware integrity checks on IoT devices running Contiki-NG to ensure patches are applied and no unauthorized modifications exist. 7. Collaborate with IoT device vendors and integrators to ensure secure configuration and timely patch management of Contiki-NG-based devices. 8. Consider deploying network-level mitigations such as rate limiting and packet validation to prevent malformed DAO packets from reaching vulnerable devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-05-12T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf385d

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 1:50:16 AM

Last updated: 2/7/2026, 6:49:04 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats