contiki-os CVE Vulnerabilities & Metrics

Focus on contiki-os vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About contiki-os Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with contiki-os. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total contiki-os CVEs: 15
Earliest CVE date: 28 May 2017, 00:29 UTC
Latest CVE date: 05 Sep 2021, 19:15 UTC

Latest CVE reference: CVE-2021-40523

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical contiki-os CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.76

Max CVSS: 7.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 10
7.0-8.9 5
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS contiki-os CVEs

These are the five CVEs with the highest CVSS scores for contiki-os, sorted by severity first and recency.

All CVEs for contiki-os

CVE-2021-40523 contiki-os vulnerability CVSS: 5.0 05 Sep 2021, 19:15 UTC

In Contiki 3.0, Telnet option negotiation is mishandled. During negotiation between a server and a client, the server may fail to give the WILL/WONT or DO/DONT response for DO and WILL commands because of improper handling of exception condition, which leads to property violations and denial of service. Specifically, a server sometimes sends no response, because a fixed buffer space is available for all responses and that space may have been exhausted.

CVE-2021-38387 contiki-os vulnerability CVSS: 5.0 10 Aug 2021, 19:15 UTC

In Contiki 3.0, a Telnet server that silently quits (before disconnection with clients) leads to connected clients entering an infinite loop and waiting forever, which may cause excessive CPU consumption.

CVE-2021-38386 contiki-os vulnerability CVSS: 5.0 10 Aug 2021, 19:15 UTC

In Contiki 3.0, a buffer overflow in the Telnet service allows remote attackers to cause a denial of service because the ls command is mishandled when a directory has many files with long names.

CVE-2021-38311 contiki-os vulnerability CVSS: 4.3 09 Aug 2021, 22:15 UTC

In Contiki 3.0, potential nonterminating acknowledgment loops exist in the Telnet service. When the negotiated options are already disabled, servers still respond to DONT and WONT requests with WONT or DONT commands, which may lead to infinite acknowledgment loops, denial of service, and excessive CPU consumption.

CVE-2021-28362 contiki-os vulnerability CVSS: 5.0 24 Mar 2021, 14:15 UTC

An issue was discovered in Contiki through 3.0. When sending an ICMPv6 error message because of invalid extension header options in an incoming IPv6 packet, there is an attempt to remove the RPL extension headers. Because the packet length and the extension header length are unchecked (with respect to the available data) at this stage, and these variables are susceptible to integer underflow, it is possible to construct an invalid extension header that will cause memory corruption issues and lead to a Denial-of-Service condition. This is related to rpl-ext-header.c.

CVE-2020-25112 contiki-os vulnerability CVSS: 7.5 11 Dec 2020, 23:15 UTC

An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.

CVE-2020-25111 contiki-os vulnerability CVSS: 7.5 11 Dec 2020, 23:15 UTC

An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.

CVE-2020-24336 contiki-os vulnerability CVSS: 7.5 11 Dec 2020, 23:15 UTC

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.

CVE-2020-13986 contiki-os vulnerability CVSS: 5.0 11 Dec 2020, 22:15 UTC

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

CVE-2020-13985 contiki-os vulnerability CVSS: 5.0 11 Dec 2020, 22:15 UTC

An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

CVE-2020-13984 contiki-os vulnerability CVSS: 5.0 11 Dec 2020, 22:15 UTC

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in net/ipv6/uip6.c.

CVE-2019-9183 contiki-os vulnerability CVSS: 5.0 23 Apr 2020, 15:15 UTC

An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. A buffer overflow is present due to an integer underflow during 6LoWPAN fragment processing in the face of truncated fragments in os/net/ipv6/sicslowpan.c. This results in accesses of unmapped memory, crashing the application. An attacker can cause a denial-of-service via a crafted 6LoWPAN frame.

CVE-2019-8359 contiki-os vulnerability CVSS: 7.5 23 Apr 2020, 15:15 UTC

An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. An out of bounds write is present in the data section during 6LoWPAN fragment re-assembly in the face of forged fragment offsets in os/net/ipv6/sicslowpan.c.

CVE-2017-7296 contiki-os vulnerability CVSS: 4.3 28 May 2017, 00:29 UTC

An issue was discovered in Contiki Operating System 3.0. A Persistent XSS vulnerability is present in the MQTT/IBM Cloud Config page (aka mqtt.html) of cc26xx-web-demo. The cc26xx-web-demo features a webserver that runs on a constrained device. That particular page allows a user to remotely configure that device's operation by sending HTTP POST requests. The vulnerability consists of improper input sanitisation of the text fields on the MQTT/IBM Cloud config page, allowing for JavaScript code injection.

CVE-2017-7295 contiki-os vulnerability CVSS: 7.8 28 May 2017, 00:29 UTC

An issue was discovered in Contiki Operating System 3.0. A use-after-free vulnerability exists in httpd-simple.c in cc26xx-web-demo httpd, where upon a connection close event, the http_state structure was not deallocated properly, resulting in a NULL pointer dereference in the output processing function. This resulted in a board crash, which can be used to perform denial of service.