CVE-2024-47181
📋 TL;DR
An unaligned memory access vulnerability in Contiki-NG's RPL implementations can cause system crashes when processing malformed IPv6 packets with odd padding. This affects IoT devices running Contiki-NG with RPL enabled and connected to an RPL instance. The impact varies by architecture but can lead to denial of service.
💻 Affected Systems
- Contiki-NG operating system
📦 What is this software?
Contiki Ng by Contiki Ng
⚠️ Risk & Real-World Impact
Worst Case
System crash leading to device reboot or permanent failure, causing denial of service for IoT devices
Likely Case
System instability or crash requiring manual intervention to restore functionality
If Mitigated
No impact if RPL is disabled or devices are not exposed to malicious network traffic
🎯 Exploit Status
Requires ability to send crafted IPv6 packets to vulnerable devices
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Next release after 4.9 (not yet released)
Vendor Advisory: https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-crjw-x84h-h6x3
Restart Required: Yes
Instructions:
1. Apply changes from pull request #2962 manually
2. Recompile Contiki-NG for affected devices
3. Deploy updated firmware
4. Restart devices
🔧 Temporary Workarounds
Disable RPL
allDisable RPL implementations if not required for device functionality
Modify Contiki-NG configuration to disable RPL
Network segmentation
allIsolate IoT devices on separate network segments
🧯 If You Can't Patch
- Implement strict network filtering for IPv6 traffic to IoT devices
- Monitor devices for crashes or abnormal behavior indicating exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check if Contiki-NG version is 4.9 or earlier and RPL is enabled in configuration
Check Version:
Check Contiki-NG build configuration or firmware version
Verify Fix Applied:
Verify pull request #2962 changes are applied or device is running post-4.9 version
📡 Detection & Monitoring
Log Indicators:
- System crash logs
- Unexpected device reboots
- RPL protocol errors
Network Indicators:
- Malformed IPv6 packets with odd padding sent to IoT devices
SIEM Query:
Search for device crash events or abnormal IPv6 traffic patterns to IoT segments