India's largest platform and marketplace for GCCs, AI & Analytics leaders & professionals

Sign in

India's largest platform and marketplace for GCCs, AI & Analytics leaders & professionals

3AI Digital Library

IoT devices at risk from Amnesia:33

3AI December 11, 2020

A new series of vulnerabilities dubbed Amnesia:33 puts millions of IoT devices at risk of being compromised.

Security researchers from Forescout disclosed the 33 vulnerabilities today. The flaws are found in four open-source TCP/IP libraries used in the firmware of products from over 150 vendors.

According to the researchers’ estimates, millions of consumer and enterprise IoT devices are at risk from Amnesia:33 vulnerabilities.

The affected libraries are uIP, FNET, picoTCP, and Nut/Net. Manufacturers have used these libraries for decades to add TCP/IP support to their products.

Here are the number of vulnerabilities discovered in each library:

  • uIP – 13
  • picoTCP – 10
  • FNET – 5
  • Nut/Nut – 5

uIP, the most vulnerable library, was also found to be used in the highest number of vendors.

Forescout also analysed the following libraries but did not find any vulnerabilities: lwIP, CycloneTCP, and uC/TCP-IP. 

Due to the prevalence of these libraries, just about every type of connected hardware is impacted by Amnesia:33—from SoCs to smart plugs, from IP cameras to servers.

Unlike the previously disclosed Ripple20 vulnerabilities, Amnesia:33 primarily affects the DNS, TCP, and IPv4/IPv6 sub-stacks.

Ripple20 and Amnesia:33 vulnerabilities both predominately consist of Out-of-Bounds Read, followed by Integer Overflow.

IoT devices (46%) represent the highest number of affected device types, according to Forescout’s research. This is followed by OT/BAS and OT/ICS at 19 percent, and then IT at 16 percent.

(Disclaimer: The opinions expressed in this column are that of the writer. The facts and opinions expressed here do not reflect the views of www.xtechalpha.com.)

    3AI Trending Articles

  • Automated Quality Excellence Framework for Data Science Modelling

    Featured Article: Author: Abhishek Sengupta, Walmart Global Tech India Introduction:  A necessary but often tedious task data scientists must perform as part of any project is quality assurance (QA) of their modules so as to prevent any unforeseen incidents during deployment. While Quality Assurance and Excellence is quite prevalent in Data Engineering, QE in Data […]

  • Data for AI -Optimizing AI Governance and Implementing Key Performance Indicators for Success

    Featured Article Author: Prabhu Chandrasekharan Artificial Intelligence (AI) is revolutionizing industries by driving automation, optimization, and innovation. As AI systems become more complex, establishing robust governance frameworks focused on ‘Data for AI’ is essential. This ensures data quality, security, and neutrality, leading to reliable AI outcomes. Effective AI governance hinges on several Key Performance Indicators […]

  • Microsoft Announces Limited Access to its Custom Neural Voice

    Microsoft announced limited access to its neural text-to-speech AI called Custom Neural Voice. The service allows developers to create custom synthetic voices. . The Custom Neural Voice is a Text-to-Speech (TTS) feature of Speech in Azure Cognitive Services that allows users to create a one-of-a-kind customized synthetic voice for their brand.  Since the preview last year in September, the […]

  • From Analytics to Gen AI: Understanding the AI & ML foundations of LLM’s

    Featured Article: Author: Nikhil Bimbrahw, Genpact From the moment we wake up, to the moment we go back to sleep, technology is everywhere. The highly digital life we live in and the development of our technological world has become the new normal. According to the International Telecommunication Union (ITU), almost 50% of the world’s population uses the […]