{"id":18028,"date":"2021-01-06T23:23:35","date_gmt":"2021-01-06T23:23:35","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18028"},"modified":"2023-03-29T16:52:06","modified_gmt":"2023-03-29T16:52:06","slug":"tcp-ip-vulnerabilities-expose-iot-ot-systems","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/","title":{"rendered":"New TCP\/IP Vulnerabilities Expose IoT, OT Systems"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Forescout Research Labs last month released a 14-page <\/span><a href=\"https:\/\/www.forescout.com\/company\/threats\/resources-to-stay-current-on-security-threats\/amnesia33-identify-and-mitigate-the-risk-from-vulnerabilities-lurking-in-millions-of-iot-ot-and-it-devices\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">white paper <\/span><\/a><span style=\"font-weight: 400;\">and a 47-page <\/span><a href=\"https:\/\/www.forescout.com\/company\/threats\/resources-to-stay-current-on-security-threats\/amnesia33-how-tcp-ip-stacks-breed-critical-vulnerabilities-in-iot-ot-and-it-devices\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">research report<\/span><\/a><span style=\"font-weight: 400;\"> detailing 33 vulnerabilities affecting millions of Internet of Things (IoT), Operational Technology (OT), and IT devices. Dubbed AMNESIA:33, these newly identified vulnerabilities include four broadly used TCP\/IP stacks and have left more than 150 vendors potentially compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Forescout&#8217;s findings are the first published study under Project Memoria, an initiative to understand the flaws and threats rooted in TCP\/IP stacks for organizations. <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/red-team-vs-blue-team-vs-purple-team\/\"><span style=\"font-weight: 400;\">Malicious actors<\/span><\/a><span style=\"font-weight: 400;\"> familiar with the vulnerabilities can use a number of devices to gain access, move laterally within networks, and cause extensive damage. Because AMNESIA:33 affects an expansive code network with deeply embedded subsystems, the task of identifying and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\"><span style=\"font-weight: 400;\">patching<\/span><\/a><span style=\"font-weight: 400;\"> vulnerable devices for your organization is as daunting as it is essential.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article will touch on TCP\/IP stacks&#8217; role in network security, the critical vulnerabilities identified by Forescout, and immediate steps to mitigate AMNESIA:33 attacks.<\/span><\/p>\n<p><b>Also Read: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/threats\/threat-hunting\/\"><b>How to Build &amp; Run a Threat Hunting Program<\/b><\/a><\/p>\n<h2><span style=\"font-weight: 400;\">TCP\/IP: Ubiquitous and insecure<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The communication protocols used in internet-capable devices are commonly known as TCP\/IP stacks, short for Transmission Control Protocol (TCP) and Internet Protocol (IP). Their implementation within networks dates back to the beginning of modern computing and still serves as a fundamental component of most devices, so they are ubiquitous &#8211; and more exploitable than imagined.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today, TCP\/IP stacks exist as automated applications on almost every computing platform. The set of rules TCP and IP enable control <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/\"><span style=\"font-weight: 400;\">how packets move<\/span><\/a><span style=\"font-weight: 400;\"> between devices. TCP manages the secure transportation of identified packets across internet-connected networks, while IP authorizes the specific destination of packets. The four TCP\/IP protocol layers are the link layer, <\/span><span style=\"font-weight: 400;\">internet layer<\/span><span style=\"font-weight: 400;\">, transport layer, and application layer. While the latter two layers are most familiar to IT professionals managing <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\"><span style=\"font-weight: 400;\">network security<\/span><\/a><span style=\"font-weight: 400;\">, the TCP\/IP model&#8217;s roots in the deeper layers make AMNESIA:33 so dangerous.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Project Memoria<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Last August, Forescout collaborated with JSOF in reporting on the <\/span><a href=\"https:\/\/www.jsof-tech.com\/ripple20\/\"><span style=\"font-weight: 400;\">Ripple20 disclosure<\/span><\/a><span style=\"font-weight: 400;\">. When this research showed that TCP\/IP security bugs weren&#8217;t limited to a few vendor-specific stacks, Project Memoria was launched to expand the study of these vulnerabilities. Before AMNESIA:33, news of 19 vulnerabilities impacting hundreds of millions of devices in the Trek TCP\/IP stack, dubbed Ripple20, was the most reported to date.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As to why Project Memoria focuses on TCP\/IP security, the answer is simple: the implementation of open source software often includes embedded TCP\/IP stacks that users rarely notice.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The thirty-three newly identified flaws collectively dubbed AMNESIA:33 nearly equal the sum of similar vulnerabilities discovered since 2013.<\/span><\/p>\n<p><strong>Also Read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/essential-iot-security-best-practices\/\">5 Essential IoT Security Best Practices<\/a><\/strong><\/p>\n<h2><span style=\"font-weight: 400;\">Affected TCP\/IP stacks<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">For their analysis, Forescout selected a sample of seven open source embedded TCP\/IP stacks, all used or supported by popular open source RTOS (real-time operating systems). With a combination of automated fuzzing based on libFuzzer and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/static-analysis-can-score-software-security\/\"><span style=\"font-weight: 400;\">static analysis<\/span><\/a><span style=\"font-weight: 400;\"> based on Joern code, four of the seven stacks presented vulnerabilities: uIP, picoTCP, FNET, and Nut\/Net. Fuzzing found 11 vulnerabilities between uIP and picoTCP, while the remaining 22 vulnerabilities were split between the four stacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Forescout&#8217;s research touches on each vulnerability and its affected components, <\/span><span style=\"font-weight: 400;\">anti-patterns<\/span><span style=\"font-weight: 400;\">, exploitability, and potential impact. Stack components impacted include DNS, IPv6, IPv4, TCP, ICMP, LLMNR, and mDNS. Forescout found <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dns-attacks\/\"><span style=\"font-weight: 400;\">DNS<\/span><\/a><span style=\"font-weight: 400;\"> to be the most vulnerable due to its complexity, with TCP and IPv4 and IPv6 sub-stacks not far behind.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The 33 stack vulnerabilities amount to 38 potential impacts to organizations, with a handful of vulnerabilities giving actors multiple options. The breakdown of the possible attacks rooted in AMNESIA:33 are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dos-attacks\/\"><span style=\"font-weight: 400;\">Denial of Service (DoS)<\/span><\/a><span style=\"font-weight: 400;\">: 26<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Information Leaks: 6<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Remote Code Execution (RCE): 4<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">DNS Cache Poisoning: 2<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Devices Impacted<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The millions of devices impacted by AMNESIA:33 stacks include embedded device components and network, office, consumer IoT, and OT devices.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Device Type<\/b><\/td>\n<td><b>Description<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Embedded Components<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Processors and operating systems like Systems on a Chip (SoC), connectivity modules, and OEM boards<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Network &amp; Office<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Appliances that aid in network traffic between devices like printers, routers, and servers<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Consumer Internet of Things (IoT)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Physical devices enabled for communication locally and in an external environment, e.g., smart devices, sensors, and game consoles<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Operational Technology (OT)\u00a0<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Computing systems implemented in industrial operations such as access controls, IP cameras, protocol gateways, and HVACs<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Forescout notes enterprise and home network IoT, OT, and IT devices are often compiled with a &#8220;mixed and matched&#8221; component design. This swath of components that end up on embedded devices is hardly noticed, never mind inspected by end consumers for potential vulnerabilities.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">AMNESIA:33 vulnerabilities<\/span><\/h2>\n<h3><span style=\"font-weight: 400;\">Memory corruption<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">AMNESIA:33 leaves devices and networks open to four potential memory corruption threats. With the right resources, actors could take full control of target devices, halt network functionality, breach sensitive information, or inject malicious DNS records. The bulk of potential impacts (79%) for AMNESIA:33 vulnerabilities are DoS attacks.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Remote Code Execution (RCE)<\/span><\/h4>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-much-is-a-google-remote-code-execution-vulnerability-worth\/\"><span style=\"font-weight: 400;\">Remote code execution<\/span><\/a><span style=\"font-weight: 400;\"> (RCE) starts with access to an initial device. The attacker can linger and move laterally through an unsecured network by gaining local administrative access, compromising data. Vulnerability assessments and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\"><span style=\"font-weight: 400;\">penetration testing<\/span><\/a><span style=\"font-weight: 400;\"> can be helpful tools in identifying potential breaches and existing malicious actors.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Denial of Service (DoS)<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Denial of service<\/span><span style=\"font-weight: 400;\"> (DoS) attacks deny service to legitimate users, thereby making the network inaccessible. During a DoS attack, actors overwhelm network traffic causing server malfunction or shutdown. Advancements in TCP\/IP technology have done well in blocking targeted DoS packets over time, but the problem remains. In DoS attacks, both local devices and more extensive networks are potential targets for actors.<\/span><\/p>\n<p><b>Also Read: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><b>Top Vulnerability Management Software<\/b><\/a><\/p>\n<h4><span style=\"font-weight: 400;\">DNS Cache Poisoning<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">DNS cache poisoning, or <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dns-attacks\/\"><span style=\"font-weight: 400;\">DNS spoofing<\/span><\/a><span style=\"font-weight: 400;\">, is an attack where an actor injects faulty data into a recursive Domain Name System (DNS) server. By doing this, the attacker can redirect traffic from the organization&#8217;s network to the malicious network. From there, a user or device could unknowingly be placing sensitive information in the attacker&#8217;s lap.<\/span><\/p>\n<p><b>Also Read: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dns-attacks\/\"><b>How to Prevent DNS Attacks<\/b><\/a><\/p>\n<h2><span style=\"font-weight: 400;\">Mitigating AMNESIA risks<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Forescout offered six recommendations for mitigating AMNESIA:33 risks:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Assess your risk and exposure<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Rely on internal DNS servers<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Disable or block <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/ipv6-security-risks\/\"><span style=\"font-weight: 400;\">IPv6 traffic<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/\"><span style=\"font-weight: 400;\">Segment<\/span><\/a><span style=\"font-weight: 400;\"> devices to reduce risk<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Patch devices if possible<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Monitor for malformed packets<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Depending on the size of your organization, completing these steps is easier said than done. In short, you can start today by logging vulnerable devices, avoiding external DNS servers, actively <\/span><a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-options-for-diyers\/\"><span style=\"font-weight: 400;\">patching<\/span><\/a><span style=\"font-weight: 400;\">, and, if possible, disabling IP traffic during your audit.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Forescout releases TCP\/IP detection tool<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Forescout also released a <\/span><a href=\"https:\/\/github.com\/Forescout\/project-memoria-detector\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">detection tool on GitHub<\/span><\/a><span style=\"font-weight: 400;\"> that can help you determine whether one of your organization&#8217;s network devices contain an AMNESIA:33 vulnerability. When run, the script uses active fingerprinting methods, like ICMP probing and TCP packet responses, to identify devices possessing stack vulnerabilities. Note that any script executions should be completed in a laboratory environment for your organization&#8217;s network.<\/span><\/p>\n<p><b>Also Read: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-options-for-diyers\/\"><b>Open Source Patch Management: Options for DIYers<\/b><\/a><\/p>\n<h2><span style=\"font-weight: 400;\">Bottom line<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">AMNESIA:33&#8217;s impact on your organization comes down to vulnerability testing and device management on your network. If your organization isn&#8217;t taking a hands-on approach to monitoring your technology inventory, then take this event as a wake-up call. With vulnerabilities in TCP\/IP stacks becoming more visible, IT managers have to be adaptable and ready to identify and patch any potential flaws that could result in an exposure. With initiatives like Project Memoria endeavoring to understand TCP\/IP stacks better, there&#8217;s hope for more robust research and solutions.<\/span><\/p>\n<p><b>Also Read: <\/b><b>Open Source Summit: Securing IoT is About Avoiding Anti-Patterns\u00a0<\/b><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ecaec2e9a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ecaec2e9a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ecaec2e9a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ecaec2e9a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ecaec2e9a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ecaec2e9a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ecaec2e9a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things (IoT), Operational Technology (OT), and IT devices. Dubbed AMNESIA:33, these newly identified vulnerabilities include four broadly used TCP\/IP stacks and have left more than 150 vendors potentially compromised. Forescout&#8217;s findings are [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":17829,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[18145,6567,1025],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[379],"class_list":["post-18028","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cyber-threats-2","tag-iot-security","tag-security-vulnerabilities","b2b_audience-awareness-and-consideration","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New TCP\/IP Vulnerabilities Expose IoT, OT Systems<\/title>\n<meta name=\"description\" content=\"Forescout researchers have identified 33 TCP\/IP vulnerabilities affecting millions of IoT, OT, and IT devices - along with mitigation steps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New TCP\/IP Vulnerabilities Expose IoT, OT Systems\" \/>\n<meta property=\"og:description\" content=\"Forescout researchers have identified 33 TCP\/IP vulnerabilities affecting millions of IoT, OT, and IT devices - along with mitigation steps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-06T23:23:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-29T16:52:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"New TCP\/IP Vulnerabilities Expose IoT, OT Systems\",\"datePublished\":\"2021-01-06T23:23:35+00:00\",\"dateModified\":\"2023-03-29T16:52:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/\"},\"wordCount\":1258,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/security.jpg\",\"keywords\":[\"cyber threats\",\"IoT security\",\"security vulnerabilities\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/\",\"name\":\"New TCP\/IP Vulnerabilities Expose IoT, OT Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/security.jpg\",\"datePublished\":\"2021-01-06T23:23:35+00:00\",\"dateModified\":\"2023-03-29T16:52:06+00:00\",\"description\":\"Forescout researchers have identified 33 TCP\/IP vulnerabilities affecting millions of IoT, OT, and IT devices - along with mitigation steps.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/security.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/security.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New TCP\/IP Vulnerabilities Expose IoT, OT Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New TCP\/IP Vulnerabilities Expose IoT, OT Systems","description":"Forescout researchers have identified 33 TCP\/IP vulnerabilities affecting millions of IoT, OT, and IT devices - along with mitigation steps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/","og_locale":"en_US","og_type":"article","og_title":"New TCP\/IP Vulnerabilities Expose IoT, OT Systems","og_description":"Forescout researchers have identified 33 TCP\/IP vulnerabilities affecting millions of IoT, OT, and IT devices - along with mitigation steps.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/","og_site_name":"eSecurity Planet","article_published_time":"2021-01-06T23:23:35+00:00","article_modified_time":"2023-03-29T16:52:06+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/security.jpg","type":"image\/jpeg"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"New TCP\/IP Vulnerabilities Expose IoT, OT Systems","datePublished":"2021-01-06T23:23:35+00:00","dateModified":"2023-03-29T16:52:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/"},"wordCount":1258,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/security.jpg","keywords":["cyber threats","IoT security","security vulnerabilities"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/","url":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/","name":"New TCP\/IP Vulnerabilities Expose IoT, OT Systems","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/security.jpg","datePublished":"2021-01-06T23:23:35+00:00","dateModified":"2023-03-29T16:52:06+00:00","description":"Forescout researchers have identified 33 TCP\/IP vulnerabilities affecting millions of IoT, OT, and IT devices - along with mitigation steps.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/security.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/security.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"New TCP\/IP Vulnerabilities Expose IoT, OT Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18028"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18028"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18028\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/17829"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18028"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18028"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18028"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}