Skip to main content

CVE-2022-35927: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in contiki-ng contiki-ng

Medium
Published: Thu Aug 04 2022 (08/04/2022, 20:35:14 UTC)
Source: CVE
Vendor/Project: contiki-ng
Product: contiki-ng

Description

Contiki-NG is an open-source, cross-platform operating system for IoT devices. In the RPL-Classic routing protocol implementation in the Contiki-NG operating system, an incoming DODAG Information Option (DIO) control message can contain a prefix information option with a length parameter. The value of the length parameter is not validated, however, and it is possible to cause a buffer overflow when copying the prefix in the set_ip_from_prefix function. This vulnerability affects anyone running a Contiki-NG version prior to 4.7 that can receive RPL DIO messages from external parties. To obtain a patched version, users should upgrade to Contiki-NG 4.7 or later. There are no workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 00:34:43 UTC

Technical Analysis

CVE-2022-35927 is a medium-severity buffer overflow vulnerability identified in the Contiki-NG operating system, specifically affecting versions prior to 4.7. Contiki-NG is an open-source, cross-platform OS designed for Internet of Things (IoT) devices, widely used in constrained environments such as sensor networks and embedded systems. The vulnerability resides in the implementation of the RPL-Classic routing protocol, which is used for IPv6 routing in low-power and lossy networks. Within this protocol, the DODAG Information Option (DIO) control message can include a prefix information option that contains a length parameter. The flaw arises because the length parameter is not properly validated before being used in the set_ip_from_prefix function, which copies the prefix data into a buffer. This unchecked copying can lead to a classic buffer overflow condition, potentially allowing an attacker to overwrite adjacent memory. Exploitation requires that the vulnerable device receives a maliciously crafted RPL DIO message from an external source. Since these messages are part of the routing protocol, an attacker positioned within network range or able to inject packets into the network could trigger the overflow. The consequences of successful exploitation could include arbitrary code execution, denial of service (device crash or reboot), or corruption of routing tables, undermining network stability and device integrity. There are no known workarounds, and remediation requires upgrading to Contiki-NG version 4.7 or later, where proper input validation has been implemented to prevent the overflow. No exploits have been reported in the wild to date, but the vulnerability's presence in IoT infrastructure poses a latent risk, especially in environments relying on Contiki-NG for critical sensor or control functions.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to sectors deploying IoT devices running Contiki-NG, such as smart cities, industrial automation, environmental monitoring, and critical infrastructure management. Exploitation could lead to disruption of sensor networks, loss of data integrity, or denial of service, potentially affecting operational continuity and safety. Given that IoT devices often operate unattended and may have limited security controls, a successful attack could be leveraged as a foothold for lateral movement or to degrade network reliability. The confidentiality impact is moderate since the vulnerability primarily targets memory corruption rather than direct data exfiltration, but integrity and availability impacts are significant due to the possibility of arbitrary code execution or device crashes. The risk is heightened in environments where devices communicate over wireless or mesh networks susceptible to packet injection. European organizations with deployments in smart grids, transportation systems, or healthcare IoT could face operational disruptions and increased maintenance costs. Furthermore, compromised IoT devices could be used as part of botnets or to launch further attacks, amplifying the threat landscape.

Mitigation Recommendations

1. Immediate upgrade to Contiki-NG version 4.7 or later is essential to eliminate the vulnerability. 2. Implement network segmentation to isolate IoT devices running Contiki-NG from critical enterprise networks, limiting exposure to malicious RPL DIO messages. 3. Deploy intrusion detection systems (IDS) or network monitoring tools capable of identifying anomalous RPL traffic or malformed DIO messages to detect potential exploitation attempts. 4. Restrict physical and network access to IoT devices to trusted entities only, reducing the risk of unauthorized packet injection. 5. Where possible, employ secure routing protocol extensions or cryptographic protections to authenticate RPL control messages, mitigating the risk of spoofed or malicious routing information. 6. Conduct regular firmware audits and vulnerability assessments on IoT deployments to ensure timely patching and detection of compromised devices. 7. Collaborate with IoT device manufacturers and vendors to ensure secure update mechanisms and incident response capabilities are in place.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3a5b

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 12:34:43 AM

Last updated: 7/27/2025, 1:56:37 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats