India's largest platform for AI & Analytics leaders & professionals

Sign in

India's largest platform for AI & Analytics leaders & professionals

3AI Digital Library

IoT devices at risk from Amnesia:33

3AI December 17, 2020

 

A new series of vulnerabilities dubbed Amnesia:33 puts millions of IoT devices at risk of being compromised.

Security researchers from Forescout disclosed the 33 vulnerabilities today. The flaws are found in four open-source TCP/IP libraries used in the firmware of products from over 150 vendors.

According to the researchers’ estimates, millions of consumer and enterprise IoT devices are at risk from Amnesia:33 vulnerabilities.

The affected libraries are uIP, FNET, picoTCP, and Nut/Net. Manufacturers have used these libraries for decades to add TCP/IP support to their products.

Here are the number of vulnerabilities discovered in each library:

  • uIP – 13
  • picoTCP – 10
  • FNET – 5
  • Nut/Nut – 5

uIP, the most vulnerable library, was also found to be used in the highest number of vendors.

Forescout also analysed the following libraries but did not find any vulnerabilities: lwIP, CycloneTCP, and uC/TCP-IP. 

Due to the prevalence of these libraries, just about every type of connected hardware is impacted by Amnesia:33—from SoCs to smart plugs, from IP cameras to servers.

Unlike the previously disclosed Ripple20 vulnerabilities, Amnesia:33 primarily affects the DNS, TCP, and IPv4/IPv6 sub-stacks.

Ripple20 and Amnesia:33 vulnerabilities both predominately consist of Out-of-Bounds Read, followed by Integer Overflow.

IoT devices (46%) represent the highest number of affected device types, according to Forescout’s research. This is followed by OT/BAS and OT/ICS at 19 percent, and then IT at 16 percent.

    3AI Trending Articles

  • 2020 marked a “turning point” for Cybersecurity in Australia

    Australians are on high alert about the threat of cyber attacks following Prime Minister Scott Morrison’s warning in June that Australia was targeted by a sophisticated “state-based” cyber-attack. It was, according to the Australian Cyber Security Centre (ACSC), the most significant and coordinated cyber-targeting against Australian institutions to date. The Prime Minister said while such […]

  • HCM Decision Making powered by Talent Sciences

    Talent Science is the business capability of using advanced data analysis techniques and predictive models to drive HCM decision making. It calls for a logical connection between decisions about people, HR program investments and strategic business outcomes. This can form a backbone of human resource function of all organizations independent of the sector in which it operates. […]

  • PoS Terminals Open Consumers to Fraud

    Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords. Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords. Researchers are detailing widespread security issues in point-of-sale (PoS) terminals – specifically, three terminal device families manufactured by vendors Verifone and […]

  • Salesforce embraces the public cloud with Hyperforce

    Salesforce is letting CIOs choose where they run its software, easing compliance with data protection and data sovereignty laws. Salesforce.com President and COO Bret Taylor believes the SaaS vendor has made “probably the most significant technological shift” since its CRM platform first launched 21 years ago. But Taylor wasn’t talking about the company’s agreement to acquire […]