Over 30 security flaws would allow hacking of smartphones, routers and industrial control devices

Specialists in a form of security report finding 33 vulnerabilities in four open source TCP/IP libraries widely used in the firmware of more than 150 vendors. Researchers believe that millions of devices used in industrial, domestic and commercial environments could be exposed to this set of failures, dubbed Amnesia:33.

All kinds of smart devices could be affected, including smartphones, video game consoles, HVAC systems, printers, routers, switches, as well as all kinds of industrial control devices.

The broad impact of these flaws lies in the fact that they affect four widely used open source libraries: uIP, FNET, picoTCP, and Nut/Net. For more than 20 years, device manufacturers have added one of these four libraries to their device firmware, allowing their products to support TCP/IP, the most widely used network communication protocols today.

La imagen tiene un atributo ALT vacío; su nombre de archivo es amnesia01.jpg
La imagen tiene un atributo ALT vacío; su nombre de archivo es amnesia02.jpg

Experts believe that, if exploited, these failures would allow threat actors to deploy multiple variants of attacks, including:

  • Remote Code Execution (RCE)
  • Denial of Service (DoS)
  • Leak of confidential information
  • DNS cache poisoning attacks
La imagen tiene un atributo ALT vacío; su nombre de archivo es amnesia03.jpg
La imagen tiene un atributo ALT vacío; su nombre de archivo es amnesia04.jpg

It should be noted that attacks vary depending on the target device and the type of network deployment. For example, by their nature, routers can be exploited remotely, as they are usually connected to a company’s external interface. Other devices, such as sensors and industrial equipment, depend on local access for abuse.

La imagen tiene un atributo ALT vacío; su nombre de archivo es amnesia05.jpg
La imagen tiene un atributo ALT vacío; su nombre de archivo es amnesia06.jpg

This finding was reported by the experts of the firm Forescout, who mention that this report is part of an investigation called Project Memory, in which the security mechanisms have been analyzed in 7 other TCP/IP stacks: “We found no faults in the lwIP, uC/TCP-IP and CycloneTCP stacks; although this does not necessarily mean that there are no failures in these batteries, we note that the batteries have consistent limits and generally do not depend on syntactic analysis,” the experts mention.

To fix the failures, affected device vendors must take the updated TCP/IP stacks and integrate them as firmware updates for their products. Although this is a relatively simple process in some products, many of the affected devices do not even have the ability to receive firmware updates, making it virtually impossible for manufacturers to fix the flaws.