In IoTivity through 1.3.1, the CoAP server interface can be used for Distributed Denial of Service attacks using source IP address spoofing and UDP-based traffic amplification. The reflected traffic is 6 times bigger than spoofed requests. This occurs because the construction of a "4.01 Unauthorized" response is mishandled. NOTE: the vendor states "While this is an interesting attack, there is no plan for maintainer to fix, as we are migrating to IoTivity Lite."
References
Link Resource
https://jira.iotivity.org/browse/IOT-3267 Exploit Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-03T16:19:39

Updated: 2022-10-03T16:19:39

Reserved: 2022-10-03T00:00:00


Link: CVE-2019-9750

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-03-13T19:29:00.347

Modified: 2021-07-21T11:39:23.747


Link: CVE-2019-9750

JSON object: View

cve-icon Redhat Information

No data.

CWE