https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Getty Images

IoT security

Protecting Your Network Against Ripple20 Vulnerabilities

Early this year, Ripple20 wrought havoc on numerous IoT devices, given vulnerable third-party code. Here are ways to prevent your organization from the fallout.
  • Written by Brien Posey
  • 25th January 2021

In the realm of technology, some events can disrupt the landscape and force practitioners to reevaluate daily operations.

Earlier this year, the arrival of the Ripple20 breach was that kind of event—reminding IT pros across the globe that vulnerable third-party code can wreak havoc on IT systems, opening the door to malicious attacks.

Earlier this year, the JSOF research lab discovered a series of vulnerabilities that became collectively known as Ripple20 (). The Ripple20 vulnerabilities exist within the Trek Inc. TCP/IP library, which is used by hundreds of millions of IoT devices ranging from industrial IoT devices to consumer grade devices used in the home. The affected software library has also been used in other types of connected devices such as point-of-sale terminals, medical equipment, and aviation-related devices. These vulnerabilities can be exploited for remote code execution and even complete device takeover. These code bugs have been difficult to track and remove because of the widespread adoption of this third-party code in various systems. Indeed, the bugs may never be fully patched in some products.

The seriousness of the Ripple20 vulnerabilities has been well established through various proof of concept demonstrations. At this point, organizations must work to determine whether they are using devices that are affected by this collection of vulnerabilities, and if so, how to go about addressing the problem.

Locating Ripple20-Affected Devices

Unfortunately, determining which of an organization’s devices are affected by the Ripple20 vulnerability is not an easy task. As previously noted, the vulnerability exists in a low-level software library that dozens of different vendors use. Because so many devices use this library, automated detection of the vulnerability is difficult at best.

But automated detection methods do exist, several tools help identify vulnerable devices. GitHub for example, contains a tool that is designed to passively monitor TCP/IP traffic flowing across a network to detect signs that devices suffer from the Ripple20 vulnerabilities.

Similarly, Forescout has released guidance to help IT pros detect Ripple20 vulnerabilities on their networks. ExtraHop has also developed a detection method.

As helpful as these tools might be, using them may not be an option for every organization. Smaller organizations for example, might lack the IT expertise to use such tools, or the licensing costs may be cost-prohibitive (although the GitHub tool is open source). If an organization can’t use the available tools to detect vulnerable devices, there is an alternative, albeit a much more tedious method, to use.

Here, an organization would method involves manually determining which of an organization’s devices suffer from the vulnerability.

The first step is to perform a comprehensive inventory of all network-connected devices. With a hardware inventory in hand, the next step is to look for devices manufactured by vendors whose products are known to be vulnerable. As of this writing, there are 31 vendors with vulnerable products, and dozens more are still being evaluated. There is the most recent list of affected vendors.

The list of includes links to each vendors’ Ripple20 response page, which for most of the affected vendors includes information about which devices are affected and on what the vendor is doing to address the vulnerability.

The best way to secure an affected device is to update the device’s firmware using a manufacturer-provided patch. Unfortunately, patching isn’t always an option. Some devices simply do not contain updatable firmware. Similarly, a manufacturer may not choose to offer patches for older devices that it no longer officially supports. It’s also possible that a vendor may still be in the process of developing or testing a patch, and does not yet have a patch available.

Organizations also have to consider the possibility that some of their devices may be vulnerable even though they do not appear on any of the lists of devices that are known to be problematic. After all, there are numerous vendors whose products are still being evaluated. Some vendors’ products will never be evaluated because the vendor is small and obscure or because it has gone out of business.

Alternative Options for Securing Affected Devices

If an organization has affected devices that cannot be patched or devices that are not confirmed but are suspected of being vulnerable, the organization will need to take other measures to protect itself. Ideally, insecure devices that cannot be made secure should be replaced with devices that known to be unaffected by the Ripple20 vulnerability. If this isn’t an option there are some things that can be done.

Make sure that potentially vulnerable devices are not accessible from the Internet. This is an extremely important step, because attacks against such devices generally originate in the outside world. If possible, organizations should also relocate potentially vulnerable devices to dedicated subnets that are isolated from the end-user network. This further reduces the chances of an attacker being able to access the device.

IT pros should also filter any traffic going to or from potentially vulnerable devices. Generally speaking, IoT devices only need to communicate with specific IP addresses. Therefore, it’s a good idea to block traffic to or from any other addresses. Firewalls should also be used to block traffic on any ports that are unnecessary, and it might even be possible to block IPv6 traffic without affecting the device’s functionality.

Tags: Network security Security Technologies

Related


  • 3d rendering of human brain on technology background
    AI Ups the Ante for IoT Cybersecurity
    Security providers in IT and OT have implemented AI, ML and other advanced technologies to make systems smarter than malicious attackers.
  • IoT security
    IoT Security Trends, 2021: COVID-19 Casts Long Shadow
    While some IoT security trends in 2021 will continue trends from 2019 and 2020, COVID-19 has brought some new threats to the fore.
  • IoT security
    IoT Device Security: Risk Assessment, Hygiene Are Key
    As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.
  • Five Principles in a Zero-Trust Security Approach to IoT
    IoT devices have created vulnerability for IT networks, but a zero-trust security approach can lock down attack vectors. Here are five key principles.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Intro to LynxSecure
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Cybersecurity Crisis Management During the Coronavirus Pandemic
  • In Industrial Realm, Trustworthy Software Means Safety

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

The eSIM Cookbook – Towards the Next Generation of Connected Devices

22nd February 2021

eSIM Delivers Greater Freedom for OEMs – by Beecham Research and Truphone

22nd February 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

#Smartbuilding technology lays the foundation for #energyefficiency efforts but also new COVID-19 goals, such as… twitter.com/i/web/status/1…

2nd March 2021
IoTWorldToday, IoTWorldSeries

IoT Remote Monitoring Helps Enterprises Traverse COVID-19 and Beyond dlvr.it/RtZ3K5 https://t.co/owJXYf1gkO

26th February 2021
IoTWorldToday, IoTWorldSeries

Securing the Industrial Internet of Things dlvr.it/RtYfYk https://t.co/khUn79dvQD

26th February 2021
IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @BluetoothSIG — the global standard for simple, secure wireless connections. ➕ Le… twitter.com/i/web/status/1…

26th February 2021
IoTWorldToday, IoTWorldSeries

How IoT Devices Can Enhance the Connected Customer Experience dlvr.it/RtPcvS

24th February 2021
IoTWorldToday, IoTWorldSeries

🤝 Meet #EIOTWORLD speaker Ingo Feldner, Project Lead for Virtual #Hardware Platforms at @RobertBoschGmbH 📅 Join hi… twitter.com/i/web/status/1…

24th February 2021
IoTWorldToday, IoTWorldSeries

Developing IoT Applications with Rust: Using a Rust Development Environment dlvr.it/RtNqrk https://t.co/wOmnoz2UVT

24th February 2021
IoTWorldToday, IoTWorldSeries

Chip-Enabled Edge AI Drives Next-Gen IoT dlvr.it/RtKcMQ https://t.co/dLjBzE6Qei

23rd February 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X