JSOF security researchers recently revealed how a series of Internet of Things vulnerabilities, dubbed “Ripple20,” could endanger connected medical devices. Here’s how.
Ripple20 exists in a low-level TCP/IP software library built by software company Treck. Many IoT device manufacturers build the library directly into their devices or integrate it through embedded third-party components. As a result, organizations may not know they’re exposed.
These vulnerabilities range in severity from small bugs with subtle effects to major flaws that could enable denial of service or information disclosure. Two of them could lead to remote code execution and allow a successful attacker to assume control over a target device. While an attacker would need to be on the network to exploit most of the Ripple20 vulnerabilities, this usually isn’t difficult because many connected devices are often connected to the Internet by mistake.
Healthcare is “particularly susceptible” to Ripple20, report researchers with CyberMDX who aided JSOF in the investigation by helping to profile devices and identify exposure.
Read the full article on Dark Reading.