Blog

Ripple20 : The Set Of Vulnerabilities

  • Home
  • /
  • Ripple20 : The Set Of Vulnerabilities

Share

RIPPLE20 set of vulnerabilities

ย In 2020 a small cybersecurity research company has found a set of 19 vulnerabilities that originated from the Treck Internet Protocol library. The vulnerabilities have affected different manufacturers as it was used in their components.

Ripple 20wattlecorp-blog-ripple20-cybersecurity

JSOF has declared information on a group of vulnerabilities known as Ripple20. They have the potential to impact millions of IoT devices across different industries. Some of them are delicate machines in the medical, transportation, manufacturing industries, etc. These vulnerabilities were seen in an American software Treck Inc. This software uses a lightweight TCP/IP stack and allows companies to connect their devices or software to the internet via TCP/IP connections. The software has been used by different manufacturers and because of this, the impact was widespread.

Read More: What Happened in the Twitter Attack?

Problems of Ripple20cybersecurity-ethicalhacking-blog-ripple20

Ripple 20 led the hackers to access vulnerable devices through local networks or over the internet and can take control of devices. One of the vulnerabilities is a DNS protocol where a hacker can attack devices that are not connected to the internet. Other possible attacks defined by JSOF, include the use of vulnerable devices to target other devices in a network, utilizing the vulnerable device to act hidden in-network, and broadcasting an attack to take control of all infected devices in the network, etc..Four of the Ripple20 vulnerabilities are critical, with CVSS (common vulnerability scoring system) scores over 9 and enable Remote Code Execution. Treck has released a security updateย addressing these vulnerabilities.

Read More

All About Bug Bounty Hunting

ย Solutions against Ripple20ripple20-set-of-vulnerabilities-ethicalhacking-cybersecurity-wattlecorp-blog

To avoid Ripple20 Vulnerabilities, detection is one of the major steps.

Products likeย EdgeIPSTMย andย EdgeFireTMย canย help owners find Ripple 20 vulnerabilitiesโ€‚through network traffic scanning. Try to block abnormal IP traffic. The users take protective measures against these vulnerabilities by installing updates from Treck, minimizing network exposure, implementing firewalls, and using virtual private networks, and internal DNS servers.

Picture of Anjali K

Anjali K

Anjali is a cybersecurity researcher with expertise in simplifying complex topics, from penetration testing to cloud security frameworks. Her work focuses on making essential security practices accessible, helping businesses and individuals adopt proactive measures to strengthen their digital defenses.

Share

Join 15,000+ Cybersecurity Innovators

Protect. Comply. Lead.

Secure your stack, stay compliant, and outpace threats with concise, fieldโ€‘tested guidance on VAPT, cloud security, and regional privacy laws delivered by Wattlecorpโ€™s
trusted advisors across the globe.

Featured Posts

Join a secure newsletter.

Secure, disturbance free and spam-free

Strengthen Your Cyber Defense Today!

Wattlecorp protects your businesses from evolving cyber threats. Get expert VAPT tailored for you.

Leave a Comment

Your email address will not be published. Required fields are marked *

Protecting Small Businesses from COVID-19

Our committment towards small businesses is now affordable.

Starting From

$349

Enquire Now

Ask our experts.

Quick Contact

Talk to our team

Protecting your Business

Book a free consultation with us .

Enquire Now

Ask our experts.
Enter your full name as it appears on official documents
Please enter a your phone number without spaces or special characters
Enter the full legal name of your company
Select the country where your company is registered
Please enter your corporate email address (must include your company domain)
Provide any extra context you would like us to know

Continue Form?

×

Would you like to continue with the form now or complete it later?

Quick Contact

Talk to our team