Vulnerability Note VU#210620

uIP and lwIP DNS resolver vulnerable to cache poisoning

Original Release date: 03 Nov 2014 | Last revised: 13 Feb 2017


The DNS resolver implemented in uIP and lwIP is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse.


CWE-330: Use of Insufficiently Random Values - CVE-2014-4883

The DNS resolver implemented in all versions of uIP, as well as lwIP versions 1.4.1 and earlier, is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse.

For more information on the technical details and impact of this vulnerability, please refer to VU#800113.


A remote, unauthenticated attacker with the ability to conduct a successful cache poisoning attack can cause a nameserver's clients to contact the incorrect, and possibly malicious, hosts for particular services. Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker's control.


Apply an Update

lwIP has released version 2.0.0 to address this issue. Users and downstream developers are encouraged to upgrade to the latest release of lwIP.

uIP is now incorporated into the Contiki project. No patch has been made available by Contiki at this time.

Please refer to VU#800113 for additional remediation and mitigation suggestions.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Contiki OSAffected01 Sep 201427 Oct 2014
lwIPAffected14 Aug 201421 Oct 2014
Philips ElectronicsAffected09 Sep 201427 Aug 2015
ThingsquareUnknown11 Sep 201427 Oct 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal 5.0 E:U/RL:OF/RC:C
Environmental 5.0 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND



Thanks to Allen D. Householder for reporting this vulnerability.

This document was written by Todd Lewellen.

Other Information

  • CVE IDs: CVE-2014-4883
  • Date Public: 03 Nov 2014
  • Date First Published: 03 Nov 2014
  • Date Last Updated: 13 Feb 2017
  • Document Revision: 24


If you have feedback, comments, or additional information about this vulnerability, please send us email.