Skip to main content

Security holes put 100 million IoT devices at risk

IoT devices
(Image credit: Shutterstock)

A new set of DNS vulnerabilities have been disclosed by Forescout Research Labs, in partnership with JSOF, with the potential to impact over 100m consumer, enterprise and industrial IoT devices.

The vulnerabilities, dubbed NAME:WRECK, affect four popular TCP/IP stacks including FreeBSD, IPnet, Nucleus NET and NetX which are used in well-known IT software and popular IoT/OT firmware. FreeBSD is used for high performance servers in millions of IT networks including Netflix and Yahoo while IoT/OT firmware such as Siemens' Nucleus NET has been used for decades in critical OT and IoT devices.

Research manager at Forescout Research Labs, Daniel dos Santos explained in a press release that patching vulnerable versions of IP stacks is the only way organizations can defend themselves against possible NAME:WRECK exploits, saying:

“NAME:WRECK is a significant and widespread set of vulnerabilities with the potential for large scale disruption. Complete protection against NAME:WRECK requires patching devices running the vulnerable versions of the IP stacks and so we encourage all organisations to make sure they have the most up to date patches for any devices running across these affected IP Stacks.” 

NAME:WRECK vulnerabilities

The NAME:WRECK vulnerabilities have the potential to impact organizations across all sectors including government, enterprise, healthcare, manufacturing and retail. For instance, in the UK more than 36,000 devices are believed to be affected. If exploited, cybercriminals or other bad actors can leverage these vulnerabilities to take target devices offline or assume control of their operations.

Some hypothetical yet entirely plausible scenarios of what bad actors could do include exposing government or enterprise servers, compromising hospitals, impacting manufacturing or shutting down retailers according to Forescout. Sensitive government or business data could be exposed, medical data could be stolen, production lines could be tampered with and retailers' lights could be switched off to disrupt their operations.

However, bad actors could also tap into access control systems and other critical building functions of residential and commercial spaces such as apartments or major hotel chains to endanger the safety of residents or guests.

According to dos Santos, “unless urgent action is taken to protect networks and the devices connected to them, it could be just a matter of time until these vulnerabilities are exploited”.

Forescout has published an advisory mitigation strategy for vendors as well as a full report detailing its findings on NAME:WRECK.

Anthony Spadafora

After living and working in South Korea for seven years, Anthony now resides in Houston, Texas where he writes about a variety of technology topics for ITProPortal and TechRadar. He has been a tech enthusiast for as long as he can remember and has spent countless hours researching and tinkering with PCs, mobile phones and game consoles.