Artificial Intelligence | News | Insights | AiThority
Bitcoin
$11,478.89
-240.6
(-2.05%)
Ethereum
$380.12
-9.18
(-2.36%)
Ripple
$0.28
-0.01
(-4.32%)
Litecoin
$54.55
-2.85
(-4.97%)
EOS
$3.01
-0.12
(-3.81%)
Cardano
$0.13
-0.01
(-5.76%)
Stellar
$0.10
-0
(-3.47%)
NEO
$14.23
+0.17
(+1.21%)
NEM
$0.06
-0
(-1.51%)
DigitalCash
$88.71
-5.32
(-5.66%)
Tether
$1.00
-0
(-0.1%)
Binance Coin
$21.89
-0.21
(-0.95%)
QTUM
$2.70
-0.08
(-2.73%)
Verge
$0.01
0
(+4.92%)
Ontology
$0.75
-0.05
(-5.96%)
ZCash
$82.30
-3.74
(-4.35%)
Steem
$0.22
-0.01
(-5.49%)

Sternum Blocks Exploitation of Multiple Critical Ripple20 Vulnerabilities

1 12

If exploited, the vulnerabilities, already on hundreds of millions of IoT devices around the world, allow hackers to remotely take over any IoT device containing the vulnerable software

Sternum, the multilayered cybersecurity company providing real-time embedded protection and visibility for IoT devices, successfully blocked the exploitation of multiple critical Ripple20 vulnerabilities. Embedding Sternum’s Embedded Integrity Verification (EIV) into firmware containing the vulnerable TCP/IP stack led to EIV automatically blocking the exploit attempts of the vulnerabilities and reported the attempts in real time.

Sternum’s announcement follows JSOF’s recent discovery of the Ripple20 zero-day vulnerabilities used in an embedded low-level TCP/IP library developed by software company Treck, Inc. The vulnerabilities affect hundreds of millions of critical IoT devices across numerous sectors, including healthcare, energy, smart homes, and more.

Recommended AI News: CommerceBlock Introduces Cloud Storage Integration For Mainstay Attestation Service

Sternum’s research team reconfirmed JSOF’s findings and successfully exploited some of the critical vulnerabilities on a device. Then, the team installed EIV onto the same device and executed the previous attack. With Sternum’s EIV already embedded, the attempted exploitation was prevented, and the team was alerted in real time of the attempt. The EIV alert included information leading to the exact vulnerable code, enabling the team to quickly patch the vulnerabilities as well as investigate the characteristics of the attempted attack.

“The power of on-device cyber security solutions focused on the exploitation of vulnerabilities will enable sustainable protection amidst the IoT revolution,” said Natali Tshuva, CEO and co-founder of Sternum. “Devices will always contain vulnerabilities and trying to patch them all is a losing game. It is essential that IoT device manufacturers embrace solutions that protect devices from exploitation. Vulnerabilities like Ripple20 will continue to be discovered; this is why we are calling for a paradigm shift in IoT cybersecurity, which requires the adoption of innovative, on-device security solutions that protect IoT devices in real time.”

The blocked Ripple20 critical vulnerabilities have a common vulnerabilities and exposures (CVE) score higher than 8, with 10 being the most severe. If exploited properly, these vulnerabilities allow for remote code execution by hackers, enabling them to take complete control of affected IoT devices. Risks of successful exploitation include hackers taking control of remote infusion pumps, stealing sensitive protected health information (PHI) from patients, altering the behavior of industrial control devices, penetrating other sensitive IoT devices in the same network, and more.

Recommended AI News: Amazon Web Services (AWS) Launches New Space Technology Segment

Numerous companies and their IoT devices have been confirmed as vulnerable in light of the Ripple20 discovery. These vendors were vulnerable because they used Treck’s TCP/IP library as a third-party component. Organizations at risk include a Fortune 500 healthcare company whose affected infusion pump could lead to larger attacks on the hospital network; a multinational technology conglomerate whose affected routers and switches could lead to denial-of-service (DOS) attacks on networks; a major computer provider in which attacks on its infected printer product line could lead to further attacks on connected enterprises; and an international electric company in which attacks on its affected products might lead to damage on industrial equipment.

Sternum’s EIV is proactive, integrity-based attack prevention embedded automatically into an IoT device’s firmware, including closed-source code, commercial operating systems, and third-party libraries. The solution prevents exploitations of potential IoT device vulnerabilities in real time, preventing all known, unknown, and advanced attacks the moment they strike and before any lasting damage is done to a device or its connected network. EIV can be deployed in any IoT device, including distributed and unmanaged IoT devices that are low on resources.

Sternum works with numerous clients across multiple industries, including medical, industry 4.0, smart energy, smart cities and more. Sternum has partnered with Telit, the global leader in IoT enablement and Sternum’s solutions will be built into Telit’s xE910 module family to give Telit’s customers in-depth visibility and security for their entire device fleet.

Recommended AI News: MTBC Force Introduces Robotic Process Automation

1 Comment
  1. […] 消息来源:Sternum Blocks Exploitation of Multiple Critical Ripple20 Vulnerabilities […]

Leave A Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.