17 June 2020

Ripple20 flaws expose hundreds of millions of devices to remote attacks


Ripple20 flaws expose hundreds of millions of devices to remote attacks

Hundreds of millions of IoT devices are at risk of remote hijacking due to dangerous security flaws affecting the Treck TCP/IP stack, which is a high-performance TCP/IP protocol suite designed for embedded systems.

According to Israel-based cybersecurity company JSOF, the Treck TCP/IP stack is plagued by a total of 19 vulnerabilities, which are collectively tracked as Ripple20.

The vulnerabilities classified as critical and high-risk could be exploited to achieve remote code execution, perform denial-of-service attacks, and to obtain potentially sensitive information. Exploitation involves sending specially crafted IP packets or DNS requests to the targets, and in some cases it may be possible to launch attacks directly from the internet.

“Ripple20 vulnerabilities are unique both in their widespread effect and impact due to supply chain effect and being vulnerabilities allowing attackers to bypass NAT and firewalls and take control of devices undetected, with no user interaction required. This is due to the vulnerabilities’ being in a low level TCP/IP stack, and the fact that for many of the vulnerabilities, the packets sent are very similar to valid packets, or, in some cases are completely valid packets. This enables the attack pass as legitimate traffic,” JSOF explained.

The researchers say that list of affected vendor includes various companies ranging from one-person boutique shops to Fortune 500 multinational corporations, such as HP, Schneider Electric, Intel, Rockwell Automation, Caterpillar, Baxter, as well as many other major international vendors suspected of being of vulnerable in medical, transportation, industrial control, enterprise, energy (oil/gas), telecom, retail and commerce, and other industries.

Of the 19 vulnerabilities, four received the highest ratings of 10 and 9.8 on the CVSSv3 vulnerability severity scale:

  • CVE-2020-11896 (CVSSv3 score: 10) - Improper handling of length parameter inconsistency in IPv4/UDP component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in remote code execution.

  • CVE-2020-11897 (CVSSv3 score: 10) - Improper handling of length parameter inconsistency in IPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in possible out-of-bounds write.

  • CVE-2020-11898 (CVSSv3 score: 9.8) - Improper handling of length parameter inconsistency in IPv4/ICMPv4 component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in exposure of sensitive information.

  • CVE-2020-11899 (CVSSv3 score: 9.8) - Improper input validation in IPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow exposure of sensitive information.

At the end of March, Treck released security patches to address the Ripple20 vulnerabilities, but the researchers say that in some cases it’s not possible to install them and users will need to implement measures to mitigate the risk of attacks.

JSOF also pointed out that some of the identified flaws were patched over the years by vendors as part of routine code changes but remained open in some of the affected devices. Furthermore, many of the vulnerabilities have several variants due to the Stack configurability and code changes over the years, the researchers say.

Back to the list

Latest Posts

Cyber Security Week in Review: April 19, 2024

Cyber Security Week in Review: April 19, 2024

In brief: the LabHost PhaaS platform shut down, Russian military hackers attacked critical infrastructure in the US and Europe, and more.
19 April 2024
Ukrainian military personnel targeted via messaging apps and dating sites

Ukrainian military personnel targeted via messaging apps and dating sites

The threat actor employs a range of software in their malicious activities, including both commercial programs and  open-source tools.
18 April 2024
Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

This marks the first time Russian nation-state hackers have posed a direct threat to critical infrastructure in Western countries.
18 April 2024