CVE-2022-2576

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-2576
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-2576.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-2576
Aliases
Published
2022-07-29T14:15:08Z
Modified
2024-06-06T13:58:59.151307Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In Eclipse Californium version 2.0.0 to 2.7.2 and 3.0.0-3.5.0 a DTLS resumption handshake falls back to a DTLS full handshake on a parameter mismatch without using a HelloVerifyRequest. Especially, if used with certificate based cipher suites, that results in message amplification (DDoS other peers) and high CPU load (DoS own peer). The misbehavior occurs only with DTLSVERIFYPEERSONRESUMPTION_THRESHOLD values larger than 0.

References

Affected packages

Git / github.com/eclipse/californium

Affected ranges

Affected versions

2.*

2.0.0
2.1.0
2.1.0-RC1
2.1.0-RC2
2.2.0
2.2.0-RC1
2.3.0
2.3.0-RC1
2.3.0-RC2
2.4.0
2.5.0
2.6.0
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2.6.6
2.7.0
2.7.1
2.7.2

3.*

3.0.0
3.1.0
3.2.0
3.3.0
3.4.0
3.5.0