A bunch of flaws in a commonly used TCP/IP software stack have put potentially tens of millions of Internet-of-Things devices, healthcare equipment, industrial control systems, and other network-connected gear at risk of remote attack, it is claimed.
The vulnerabilities are dubbed Ripple20 – because hey, what’s a bug reveal without a marketing push these days? – and were found and reported by infosec outfit JSOF. The team’s disclosure this week of the security holes lightly details 19 CVE-listed bugs in a TCP/IP stack developed by US outfit Treck for embedded systems.
Some of the programming blunders are remotely exploitable to run arbitrary code on the host, we’re told, so it’s possible to thus hijack vulnerable boxes over a network, or even the internet if the equipment is accessible from the public ‘net.
“An attacker could hide malicious code within embedded devices for years,” JSOF says of the flaw. “One of the vulnerabilities could enable entry from outside into the network boundaries; and this is only a small taste of the potential risks.”
JSOF claimed the vulnerable stack is used in tens of millions of Internet-of-Things and network-connected embedded devices: the flaws may have been present for more than a decade, and adopted by dozens of vendors.
Nine in ten biz applications harbor out-of-date, unsupported, insecure open-source code, study shows
“The software library spread far and wide, to the point that tracking it down has been a major challenge,” the JSOF team said. “As we traced through the distribution trail of Treck’s TCP/IP library, we discovered that over the past two decades this basic piece of networking software has been spreading around the world, through both direct and indirect use.”
Manufacturers confirmed to have shipped products using the vulnerable stack include Intel, HP, and Rockwell, and the bug-hunters believe many more vendors will be caught up in the Ripple20 saga, including Broadcom, Cisco, EMC, Nvidia, Texas Instruments, and Marvell.
“Most of the vulnerabilities are true zero-days, with four of them having been closed over the years as part of routine code changes but remained open in some of the affected devices,” the JSOF crew said. “Many of the vulnerabilities have several variants due to the stack configurability and code changes over the years.”
Updating a device to use the latest version of the Treck TCP/IP stack, namely 184.108.40.206, will squash the bugs. The software’s maker said in a statement:
On the bright side, there are no reports of any of the flaws being targeted in the wild, so hardware vendors have time to rebuild their firmware images with the fixed stack and push these out to machines worldwide. We all know this is unlikely to happen in a widespread manner: manufacturers may decline to update older gear, or may not care, or punters may not realize they need to apply security updates nor care, and some gadgets may not be field upgradeable.
The flaw-finders promised to spill the beans about the holes in August when they’re due to present their work during the online version of the annual Black Hat USA security conference. ®
Tech News from Search $ Technology