Certificate-based DTLS Handshake Failure Leading to DoS Vulnerability in Eclipse Californium 2.3.0 to 2.6.0

Certificate-based DTLS Handshake Failure Leading to DoS Vulnerability in Eclipse Californium 2.3.0 to 2.6.0

CVE-2020-27222 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

In Eclipse Californium version 2.3.0 to 2.6.0, the certificate based (x509 and RPK) DTLS handshakes accidentally fails, because the DTLS server side sticks to a wrong internal state. That wrong internal state is set by a previous certificate based DTLS handshake failure with TLS parameter mismatch. The DTLS server side must be restarted to recover this. This allow clients to force a DoS.

Learn more about our Cis Benchmark Audit For Server Software.