In Eclipse Californium version 2.0.0 to 2.7.2 and 3.0.0-3.5.0 a DTLS resumption handshake falls back to a DTLS full handshake on a parameter mismatch without using a HelloVerifyRequest. Especially, if used with certificate based cipher suites, that results in message amplification (DDoS other peers) and high CPU load (DoS own peer). The misbehavior occurs only with DTLSVERIFYPEERSONRESUMPTION_THRESHOLD values larger than 0.
{
"cwe_ids": [
"CWE-408"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/2xxx/CVE-2022-2576.json",
"cna_assigner": "eclipse",
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "2.0.0"
},
{
"last_affected": "2.7.2"
},
{
"last_affected": "3.0.0"
},
{
"last_affected": "3.5.0"
}
],
"source": "AFFECTED_FIELD"
}
]
}{
"cpe": "cpe:2.3:a:eclipse:californium:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "2.0.0"
},
{
"last_affected": "2.7.2"
},
{
"introduced": "3.0.0"
},
{
"last_affected": "3.5.0"
}
],
"source": "CPE_FIELD"
}