There is a new set of critical vulnerabilities that are exposing millions of devices to hackers

Recently, a set of zero-day vulnerabilities was discovered in a software library developed by Treck. Inc is integrated into millions of electronic equipment. Of the 19 security holes identified by researchers as Ripple20, four represent a high-level threat to companies and entities in various sectors.

The software library launched in 1997 has been used over the past 20 years to allow Internet connections over TCP / IP protocols. Among the entities that use it are government institutions, as well as aerospace companies and those in the health, energy, logistics and telecommunications sectors.

According to the analysis carried out by JSOF, the cybersecurity company that detected Ripple20, there are at least 22 affected companies, including HP, Xerox, Cisco, Schneider Electric, Intel or even Caterpillar. The report details that, to date, there are 72 companies, such as Canon, Fujitsu, IBM, NASA or Toshiba, that may be at risk.

How can hackers take advantage of Ripple20 to attack companies?

The vulnerabilities in question allowed hackers to connect to any of the affected equipment, whether via the Internet or a local network, paralyzing them and forcing them to execute malicious code. In a statement, Igor Unanue, CTO of S21Sec, explains that among the objectives of cybercriminals are still actions of industrial cyber espionage, malware distribution, information exfiltration and DDoS attacks.

According to CyberMDX, a medical device security company that participated in the JSOF investigation, the health sector was most affected by Ripple20 and it is estimated that more than 52,000 devices have been affected. The retail and manufacturing sectors follow.

Treck. Inc has already confirmed on its website that it has updated the software library taking into account the vulnerabilities discovered, including also patches for each of the reported failures.

To avoid being at risk of being attacked through vulnerabilities, S21sec researchers recommend keeping computer equipment products and services up to date. In addition, it is important to invest in the implementation of security solutions at all levels and in the awareness of all company employees for some of the most common threats and mitigation strategies.