Vulnerability in tcp/ip stack enables rces and DoS on iot devices

Spread the love

Security researchers have discovered vulnerabilities in four common tcp/ip stacks used for dns in internet-of-things devices. By exploiting those vulnerabilities, it is possible to take devices offline or take them over.

It concerns nine different vulnerabilities that were discovered by security company Forescout. That captures the vulnerabilities together under the name Name:wreck. Seven of those vulnerabilities are in the tcp/ip stack of Nucleus NET and NetX, one is in FreeBSD and one is in IPnet. Forescout has since contacted these organizations. The vulnerabilities would have been repaired in those stacks, although manufacturers of, for example, Iot devices still have to implement them.

The exploits in most cases involve the dns server and how it validates names when parsing or compressing. This makes it possible to perform a denial-of-service and take a device offline, and in some cases even to enable remote code execution.

Practical exploitation of the vulnerabilities does require an attacker to have access to a victim’s internal network. Forescout mentions one of the nine vulnerabilities that can be implemented in Nucleus NET. In one example, Forescout also describes that an attacker must then set up their own dhcp server that can push its own dns to the device.

CPU stack Vulnerability Score
CVE-2020-7461 FreeBSD Remote code execution 7.7
CVE-2016-20009 IPnet Remote code execution 9.8
CVE-2020-15795 Nucleus NET Remote code execution 8.1
CVE-2020-27009 Nucleus NET Remote code execution 8.1
CVE-2020-27736 Nucleus NET Denial of service 6.5
CVE-2020-27737 Nucleus NET Denial of service 6.5
CVE-2020-27738 Nucleus NET Denial of service 6.5
CVE-2021-25677 Nucleus NET dns spoofing 5.3
CVE-2021-25677 NetX Denial of service 6.5
You might also like