Security holes put 100 million IoT devices at risk
Set of nine vulnerabilities could disrupt life as we know it if exploited
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
A new set of DNS vulnerabilities have been disclosed byForescout Research Labs, in partnership with JSOF, with the potential to impact over 100m consumer, enterprise and industrialIoTdevices.
The vulnerabilities, dubbed NAME:WRECK, affect four popular TCP/IP stacks including FreeBSD, IPnet, Nucleus NET and NetX which are used in well-known IT software and popular IoT/OT firmware.FreeBSDis used for high performance servers in millions of IT networks including Netflix and Yahoo while IoT/OT firmware such as Siemens' Nucleus NET has been used for decades in critical OT and IoT devices.
Research manager at Forescout Research Labs, Daniel dos Santos explained in a press release that patching vulnerable versions of IP stacks is the only way organizations can defend themselves against possible NAME:WRECK exploits, saying:
“NAME:WRECK is a significant and widespread set of vulnerabilities with the potential for large scale disruption. Complete protection against NAME:WRECK requires patching devices running the vulnerable versions of the IP stacks and so we encourage all organisations to make sure they have the most up to date patches for any devices running across these affected IP Stacks.”
NAME:WRECK vulnerabilities
The NAME:WRECK vulnerabilities have the potential to impact organizations across all sectors including government, enterprise, healthcare, manufacturing and retail. For instance, in the UK more than 36,000 devices are believed to be affected. If exploited, cybercriminals or other bad actors can leverage these vulnerabilities to take target devices offline or assume control of their operations.
Some hypothetical yet entirely plausible scenarios of what bad actors could do include exposing government or enterprise servers, compromising hospitals, impacting manufacturing or shutting down retailers according to Forescout. Sensitive government or business data could be exposed, medical data could be stolen, production lines could be tampered with and retailers' lights could be switched off to disrupt their operations.
However, bad actors could also tap intoaccess control systemsand other critical building functions of residential and commercial spaces such as apartments or major hotel chains to endanger the safety of residents or guests.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
According to dos Santos, “unless urgent action is taken to protect networks and the devices connected to them, it could be just a matter of time until these vulnerabilities are exploited”.
Forescout has published anadvisory mitigation strategyfor vendors as well as afull reportdetailing its findings on NAME:WRECK.
After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.
Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics
This new phishing strategy utilizes GitHub comments to distribute malware
Arcane season 2 finally gave us the huge Caitlyn and Vi moment we’ve been waiting for – and its creators say ‘we couldn’t have done it in season one’