Is Linux affected by Ripple20?

Is Linux affected by Ripple20?

Our products uses the Linux TCP stack and not the impacted Treck TCP/IP stack. We maintain our own network stack as well as embedded system.

What are Ripple20 vulnerabilities?

Ripple20 is a set of vulnerabilities discovered in 2020 in a software library that implemented a TCP/IP stack. The security concerns were discovered by JSOF, which named the collective vulnerabilities for how one company’s code became embedded into numerous products.

What devices are affected by Ripple20?

The most common device types running Treck include infusion pumps, printers, UPS systems, networking equipment, Point of Sale devices, IP cameras, video conferencing systems, building automation devices and ICS devices.

What is urgent11?

URGENT/11 is a unique group of vulnerabilities that allow attackers to circumvent NAT and firewalls and take control over devices remotely via the TCP/IP stack undetected, with no user interaction required.

What is Treck TCP IP stack?

Treck TCP/IP Stack are networking protocols libraries specifically designed for embedded systems and are widely used. Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the application.

What are the ripple20 vulnerabilities and their impact?

Ripple20 vulnerabilities are unique both in their widespread effect and impact due to supply chain effect and being vulnerabilities allowing attackers to bypass NAT and firewalls and take control of devices undetected, with no user interaction required.

How many vulnerabilities are there in Treck TCP / IP stack?

Ripple20 is a set of 19 vulnerabilities found on the Treck TCP/IP stack . Four of the Ripple20 vulnerabilities are rated critical, with CVSS scores over 9 and enable Remote Code Execution.

Why was ripple20 important to the supply chain?

The interesting thing about Ripple20 is the incredible extent of its impact, magnified by the supply chain factor. The wide-spread dissemination of the software library (and its internal vulnerabilities) was a natural consequence of the supply chain “ripple-effect”.

Are there IoT devices that use ripple20?

Ripple20 reached critical IoT devices from a wide range of fields, involving a diverse group of vendors.