Description
In Eclipse Californium version 2.3.0 to 2.6.0, the certificate based (x509 and RPK) DTLS handshakes accidentally fails, because the DTLS server side sticks to a wrong internal state. That wrong internal state is set by a previous certificate based DTLS handshake failure with TLS parameter mismatch. The DTLS server side must be restarted to recover this. This allow clients to force a DoS.
Remediation
References
https://bugs.eclipse.org/bugs/show_bug.cgi?id=570844
Related Vulnerabilities
CVE-2022-22965 Vulnerability in maven package org.springframework:spring-webflux
CVE-2019-8331 Vulnerability in maven package org.webjars.bowergithub.jasny:bootstrap
CVE-2020-2209 Vulnerability in maven package org.jenkins-ci.plugins:testcomplete
CVE-2015-7559 Vulnerability in maven package org.apache.activemq:activemq-core
CVE-2022-29251 Vulnerability in maven package org.xwiki.platform:xwiki-platform-flamingo-theme-ui