EEVblog Electronics Community Forum

Products => Computers => Networking & Wireless => Topic started by: madires on December 08, 2020, 01:17:09 pm

Title: AMNESIA:33 - TCP/IP stacks uIP, FNET, picoTCP and Nut/Net
Post by: madires on December 08, 2020, 01:17:09 pm
Critical vulnerabilities in TCP/IP stacks uIP, FNET, picoTCP and Nut/Net: https://www.forescout.com/company/blog/amnesia33-forescout-research-labs-finds-33-new-vulnerabilities-in-open-source-tcp-ip-stacks/ (https://www.forescout.com/company/blog/amnesia33-forescout-research-labs-finds-33-new-vulnerabilities-in-open-source-tcp-ip-stacks/) (beware of the marketing)
Title: Re: AMNESIA:33 - TCP/IP stacks uIP, FNET, picoTCP and Nut/Net
Post by: EasyGoing1 on February 25, 2021, 01:49:35 pm
These days, Im skeptical of statements like this

Generally, these vulnerabilities can be exploited to take full control of a target device (RCE)

Who's still out there making operating systems where the network layer processes are given root-level access? WHO? Cause they should be shot whoever they are.
Title: Re: AMNESIA:33 - TCP/IP stacks uIP, FNET, picoTCP and Nut/Net
Post by: andersm on February 25, 2021, 09:43:28 pm
Who's still out there making operating systems where the network layer processes are given root-level access?
The listed stacks are pretty much all aimed at microcontrollers.
Title: Re: AMNESIA:33 - TCP/IP stacks uIP, FNET, picoTCP and Nut/Net
Post by: madires on April 13, 2021, 07:20:37 pm
Next one: NAME:WRECK
https://therecord.media/namewreck-vulnerabilities-impact-millions-of-smart-and-industrial-devices/
Title: Re: AMNESIA:33 - TCP/IP stacks uIP, FNET, picoTCP and Nut/Net
Post by: ejeffrey on April 14, 2021, 01:10:21 am
These days, Im skeptical of statements like this

Generally, these vulnerabilities can be exploited to take full control of a target device (RCE)

Who's still out there making operating systems where the network layer processes are given root-level access? WHO? Cause they should be shot whoever they are.

There are no operating systems of any commercial or practical use where remote code execution in the network stack is not the highest level of security vulnerability.  Even if you have process isolation from the network code it has sufficiently privileged to be game over from a security standpoint.