Security News > 2021 > February > Vulnerabilities in TCP/IP Stacks Allow for TCP Connection Hijacking, Spoofing

Vulnerabilities in TCP/IP Stacks Allow for TCP Connection Hijacking, Spoofing
2021-02-12 15:50

Improperly generated ISNs in nine TCP/IP stacks could be abused to hijack connections to vulnerable devices, according to new research from Forescout.

TCP/IP stacks are critical components that provide basic network connectivity for a broad range of devices, IoT and OT included, and which process all incoming frames and packets.

Numerous high-impact vulnerabilities affecting the TCP/IP stacks have already been publicly disclosed, including the Ripple20 and URGENT/11 bugs.

Collectively referred to as NUMBER:JACK, the vulnerabilities affect cycloneTCP, FNET, MPLAB Net, Nucleus NET, Nut/Net, picoTCP, uIP, uC/TCP-IP, and TI-NDKTCPIP. ISNs must be randomly generated, so as to ensure the uniqueness of any TCP connection between two devices, and to eliminate collisions and interference with the connection.

"However, the actual severity on a particular device and TCP connection may vary depending on, for example, the use of encrypted sessions and the sensitivity of data exchanged," Forescout's researchers note.

With the vulnerable stacks implemented in millions of embedded devices, including IT storage systems, medical devices, remote terminal units, and monitoring systems for wind turbines, among others.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/ukd2X5cB6gs/vulnerabilities-tcpip-stacks-allow-tcp-connection-hijacking-spoofing