Vulnerabilities in TCP/IP stacks put IoT devices at risk, such as printers or medical devices. German companies are also at risk.
What happened?
Nine vulnerabilities of medium to critical severity were discovered in a widely used software by security researchers from JSOF andForescout Research Labs . The identified vulnerabilities are referred to as “NAME:WRECK”. The operating systems “FreeBSD”, “IPNet”, “Nucleus NET” (Siemens) and “NetX” are affected. These are commonly used in two types of devices:
The widespread use of the software and the possibility of access via the Internet lead to a significantly increased attack surface. It is believed that around 100 million devices are affected. According to the Forescout report , Germany is among the top 5 countries with identified exposed devices where Nucleus NET and FreeBSD are used. The healthcare sector and areas with industrial manufacturing processes are particularly at risk.
What are the risks for my company from exploiting NAME:WRECK?
If the attackers successfully exploit the vulnerabilities, there is a possibility that the targeted devices could be taken offline. In the worst case, the attacker can gain control of the devices – unauthorised and unnoticed by the user.
Further background on the threat of NAME:WRECK
The vulnerabilities affect the DHCP and DNS implementations of the TCP/IP stacks of the four operating systems mentioned. The TCP/IP model helps you determine how a particular system should be connected to the Internet and how the data should be transmitted.
FreeBSD
As the researchers point out in their report, FreeBSD is widely known for being used in millions of IT networks for high-performance servers, including major websites such as Netflix and Yahoo. The most common types of devices in the Device Cloud that run FreeBSD include computers, printers, and network devices.
Nucleus NET
Nucleus NET, in turn, is used in numerous IoT and OT devices. The most common device types under Nucleus are building automation, operations engineering, and VoIP.
NetX
NetX is usually operated with the RTOS ThreadX. Typical applications include medical devices, systems-on-a-chip, and various printer models. Some of the most common types of devices that run ThreadX include printers, smart watches, and power and power devices in industrial control systems.
These devices and the associated industries are expected to be the most at risk. NAME:WRECK thus seems to be more of a threat to large organizations.
Fortunately, not all versions are vulnerable to what the researchers call the NAME:WRECK threat.
You can find more background on the topic in the Forescout report .
What can I do?