Bug 1930230 (CVE-2020-27222) - CVE-2020-27222 californium-core: DTLS - DoS vulnerability for certificate based handshakes
Summary: CVE-2020-27222 californium-core: DTLS - DoS vulnerability for certificate bas...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-27222
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1924976
TreeView+ depends on / blocked
 
Reported: 2021-02-18 14:35 UTC by msiddiqu
Modified: 2021-08-18 13:28 UTC (History)
13 users (show)

Fixed In Version: californium-2.6.1
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in californium. The certificate based (x509 and RPK) DTLS handshakes fails due to the DTLS server side being set to a wrong internal state by a previous certificate based DTLS handshake failure with TLS parameter mismatch. The highest threat from this vulnerability is to system availability.
Clone Of:
Environment:
Last Closed: 2021-08-18 13:28:17 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:3205 0 None None None 2021-08-18 09:13:43 UTC
Red Hat Product Errata RHSA-2021:3207 0 None None None 2021-08-18 09:55:15 UTC

Description msiddiqu 2021-02-18 14:35:45 UTC
In Eclipse Californium version 2.3.0 to 2.6.0, the certificate based (x509 and RPK) DTLS handshakes accidentally fails, because the DTLS server side sticks to a wrong internal state. That wrong internal state is set by a previous certificate based DTLS handshake failure with TLS parameter mismatch. The DTLS server side must be restarted to recover this. This allow clients to force a DoS.


References:

https://bugs.eclipse.org/bugs/show_bug.cgi?id=570844

Comment 1 Jonathan Christison 2021-02-18 16:11:42 UTC
Marking Red Hat Fuse 7 and Red Hat Integration Camel K as having a moderate impact as although the vulnerable org.eclipse.californium:scandium:jar:* artifact is used as part of camel-coap the impact is lessened due to the following reasons -

* A successful attack on the component would not result in a total loss of availability. 

* Only the coaps (UDP + DTLS) protocol is impacted by this flaw, this increases the attack complexity as the configuration of camel-coap is beyond the attackers control.

Further extenuating factors which we have not taken into account for the impact of this flaw but which might be a factor in considering the risk an end application may be exposed to, is that CoAP networks are often not accessible to WAN traffic, therefore the attack vector would likely be Adjacent as opposed to Network in those situations.

Comment 6 errata-xmlrpc 2021-08-18 09:13:41 UTC
This issue has been addressed in the following products:

  Red Hat Integration

Via RHSA-2021:3205 https://access.redhat.com/errata/RHSA-2021:3205

Comment 7 errata-xmlrpc 2021-08-18 09:55:13 UTC
This issue has been addressed in the following products:

  Red Hat Integration

Via RHSA-2021:3207 https://access.redhat.com/errata/RHSA-2021:3207

Comment 8 Product Security DevOps Team 2021-08-18 13:28:17 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-27222


Note You need to log in before you can comment on or make changes to this bug.