Forescout has released an open source tool to help identify network devices running TCP / IP stacks affected by the “Amnesia: 33” vulnerability bundle.
We wrote about 33 vulnerabilities in four open source TCP / IP libraries in early December. As noted by cybersecurity researchers, leaky libraries are used in firmware from more than 150 vendors.
In addition, the experts also identified four new vulnerabilities in the Treck TCP / IP stack version 126.96.36.199 and older. By the way, Treck confirmed the presence of security problems .
The most dangerous vulnerability in the bundle – CVE-2020-25066 – has been given a critical status, if exploited, an attacker can cause a DoS, and, more importantly, execute arbitrary code.
Fortunately, the developers have already fixed the identified vulnerabilities, and the researchers did not find any publicly available exploits designed to exploit these particular holes.
As for the Forescout tool, you can find it on GitHub. In essence, this is a script whose main task is to detect the use of one of the four vulnerable TCP / IP stacks.
“Just in case, let us clarify that the script is not devoid of the problem of false positives,” – said representatives of Forescout.