India's largest platform and marketplace for GCCs, AI & Analytics leaders & professionals

Sign in

⁠India’s largest platform & marketplace for AI & GCC leaders & professionals

3AI Digital Library

IoT devices at risk from Amnesia:33

3AI December 11, 2020

A new series of vulnerabilities dubbed Amnesia:33 puts millions of IoT devices at risk of being compromised.

Security researchers from Forescout disclosed the 33 vulnerabilities today. The flaws are found in four open-source TCP/IP libraries used in the firmware of products from over 150 vendors.

According to the researchers’ estimates, millions of consumer and enterprise IoT devices are at risk from Amnesia:33 vulnerabilities.

The affected libraries are uIP, FNET, picoTCP, and Nut/Net. Manufacturers have used these libraries for decades to add TCP/IP support to their products.

Here are the number of vulnerabilities discovered in each library:

  • uIP – 13
  • picoTCP – 10
  • FNET – 5
  • Nut/Nut – 5

uIP, the most vulnerable library, was also found to be used in the highest number of vendors.

Forescout also analysed the following libraries but did not find any vulnerabilities: lwIP, CycloneTCP, and uC/TCP-IP. 

Due to the prevalence of these libraries, just about every type of connected hardware is impacted by Amnesia:33—from SoCs to smart plugs, from IP cameras to servers.

Unlike the previously disclosed Ripple20 vulnerabilities, Amnesia:33 primarily affects the DNS, TCP, and IPv4/IPv6 sub-stacks.

Ripple20 and Amnesia:33 vulnerabilities both predominately consist of Out-of-Bounds Read, followed by Integer Overflow.

IoT devices (46%) represent the highest number of affected device types, according to Forescout’s research. This is followed by OT/BAS and OT/ICS at 19 percent, and then IT at 16 percent.

(Disclaimer: The opinions expressed in this column are that of the writer. The facts and opinions expressed here do not reflect the views of www.xtechalpha.com.)

    3AI Trending Articles

  • AI revolution in SMB-Challenges and Way Forward

    Featured Article: Author: Raj Sadasivam, Jana Analysis As most of us would agree, we are on the cusp of the third major revolution in the history of mankind. The invention of letter press in the 15th century by Gutenberg was the first and the internet revolution in the 1990s being the second. Now the world […]

  • RBI provides new set of guidelines for the Digital Banking and Payments ecosystem

    The master direction on digital payment security controls, released last week, casts a wide net. The skyrocketing of online transactions in the country—Covid-19 has provided no small impetus, with the amount transacted via UPI doubling in January 2021, at Rs 4.3 lakh crore, from lasts year’s Rs 2.1 lakh crore—calls for fortifying cybersecurity in the […]

  • Data Science/Machine Learning and Software Quality

    Featured Article: Author: Biju Kalleppilli, Director-Performance Engineering, SAP Labs India Endless possibilities of data science applications in Software quality are probably an underrated one. At various stages of product testing life cycle, huge amount of data is generated and remain unexplored., primarily because the top management often become happy by looking at the quality metrics […]

  • POV: Executive’s guide to build GenAI COE Effectively

    Featured Article Author: Mausam Deb (Healthcare & Life Science – AI Leadership Consultant) Generative AI (aka LLM) is no less than a rage for the last few years. The democratization of technology achieved by OpenAI through its GPT-3.5 model is remarkable. Market size of GenAI is growing in leaps and bounds. Every company in the […]