Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

2/10/2021
06:50 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

High-Severity Vulnerabilities Discovered in Multiple Embedded TCP/IP Stacks

Flaw leaves millions of IT, OT, and IoT devices vulnerable to attack.

A long-known implementation error in the Transmission Control Protocol (TCP) that network devices use to communicate with each other continues to persist in TCP/IP stacks used in millions of IT, OT, and IoT devices.

The vulnerabilities give attackers a way to hijack TCP connections, close them, spoof packets, bypass authentication, and inject data into network traffic. The flaws were discovered in nine out of 11 TCP/IP stacks recently analyzed by Forescout as part of a broader study in recent months of the communication protocol's security.

Related Content:

Understanding TCP/IP Stack Vulnerabilities in the IoT

Special Report: How IT Security Organizations are Attacking the Cybersecurity Problem

New From The Edge: Fighting Fileless Malware, Part 2: Countermeasures

The vulnerabilities—the same across all nine stacks—involve the manner in which the so-called Initial Sequence Number (ISN) is generated.

The ISN ensures that every TCP connection is unique, that there are no collisions with other connections, and that no third party can interfere with an ongoing connection. To guarantee this, the ISN is randomly generated so no one can guess the number and use it to hijack an ongoing connection or spoof a new one.

Forescout's analysis showed problems with the manner in which the TCP/IP stacks that were analyzed generate the ISNs. In nine of the 11 stacks, the ISNs were improperly generated, leaving the connections open to attacks. In some cases, the numbers were predictable, and in others, the problem had to do with the underlying algorithm. In other cases, the numbers had constant increments, while others used a combination of values that could be inferred, Forescout said in its report.

"TCP/IP stacks tend to have many critical vulnerabilities that are widespread," says Daniel dos Santos, research manager at Forescout Research Labs.

The vulnerabilities in general tend not to be related to a specific stack vendor or to a stack being open- or closed source. Rather, the problem has to do with code that was designed and implemented decades ago - that there's been relativley little analysis by the security community in this space. "These vulnerabilities are reminiscent of issues seen and fixed in the IT world—think Linux, Windows, UNIX—a long time ago."

Forescout's study involved seven open-source TCP/IP stacks (uIP, FNET, picoTCP, Nut/Net, lwIP, cycloneTCP, and uC/TCP-IP) and four from commercial vendors: MPLAB Net from Microchip; Texas Instruments' NDKTCPIP, ARM's Nanostack, and Siemens' Nucleus NET. Forescout last October informed the vendors and maintainers of these stacks of the vulnerabilities it had discovered; patches or mitigations have been issued for all the vulnerable stacks except for Nut/Net and uIP.

Second Batch of TCP/IP Vulnerabilities

Forsecout's discovery of the ISN vulnerabilities -- which it is collectively calling Number:Jack -- follows a similar disclosure by the company last year of 33 memory corruption vulnerabilities in TCP/IP implementations in products from 150 vendors. According to the company those vulnerabilities, dubbed Amnesia:33, were more severe than the ISN flaws it announced this week. That's because Amnesia:33 allowed for device compromise, remote code execution, data theft, and denial-of-service attacks.

But Dos Santos says that finding and exploiting ISN generation vulnerabilities is much easier for an attacker than discovering and exploiting memory corruption issues. "[That's] because the analysis of the code is more targeted and the exploitation is similar across devices, regardless of specifics of architecture or memory organization."

The bug discoveries are part of a broader Project Memoria initiative by Forescout to analyze the security of widely used TCP/IP stacks.

"Project Memoria was prompted by us recognizing the foundational nature of embedded TCP/IP stacks in modern devices and the fact that these stacks are often 'ancient' pieces of code that get reused many times over," Dos Santos says. The goal is not just to find new vulnerabilities, but to consolidate the knowledge around these types of issues, he says.

Going into the study, Forescout expected to unearth new vulnerabilities in TCP/IP, but not at the scale it has, he says. What the research has shown is that these stacks have several vulnerabilities and often in the same places.

"We tend to find these 'anti-patterns' repeated over and over again," Dos Santos notes. "The ISN issue is a typical example of a very specific feature that is vulnerable in almost every instance we analyzed."

Affected Devices

In its report this week Forescout pointed to several public use cases of the TCP/IP stacks that the company analyzed, including in medical devices, IT storage systems, wind-turbine monitoring systems, and remote terminal units.

The company says that organizations using devices with these stacks should consider employing encrypted connections and limiting exposure of the devices to the Internet.

To mitigate risk of exposure to these vulns, Forescout recommends using IPSec encrypted connections, limiting the network exposure of critical vulnerable devices, and patching whenever device vendors release advisories. The security vendor also advocates that organizations discover and inventory devices with buggy TCP/IP stacks, and segment their network to minimize damage.

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
lancop
50%
50%
lancop,
User Rank: Moderator
2/11/2021 | 9:42:40 AM
Another great article from Jai Vijayan
I always appreciate your in-depth & concise security alert articles. They help me to stay on top of emerging exploits.

Having been in IT my entire adult life, I am always sobered by the endless number & variety of computing vulnerabilities that keep cropping up in my profession. It's a painful reminder that the Information Age, where information is supposed to be THE storehouse of economic value, is actually a Wild West free-for-all where theft of valuable data is almost a trivial problem. Certainly easier for the bad guys than actually robbing a bank or physically stealing blueprints for an innovative new product.

What this means for the future is that the real economic value is having the industrial infrastructure to create marketable products from stolen R&D files. And that radically shifts the global economic competitiveness paradigm, doesn't it.
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3493
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
CVE-2021-3492
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...