The cybersecurity researchers have been warning regarding a set of very severe vulnerabilities that are continuously affecting TCP/IP stacks let hackers attack Millions of IoT, OT and IT Devices.

The revelation of 33 TCP/IP stacks Zero-Day Vulnerabilities attacking all the smart devices produced by over 150 different tech firms and has again delivered the spotlight on lax approaches to IoT security at the extension level.  


Here the main motive is to patch them over every device, which implies that users must either live with the hazard of accommodation or splash out on increased anticipations that can never ensure protection.

Zero-Day Vulnerabilities

The 33 zero-day vulnerabilities are impacting four extensively used open-source TCP/IP stacks. However, all vulnerabilities remain in the uIP, FNET, picoTCP, and Nut/Net stacks; these serve as foundational connectivity elements for millions of IoT, OT, networking, and IT devices.

All these four vulnerabilities could allow a range of ill-disposed attacks, from memory corruption to the denial of service, and all the data that are leaked to remote code execution. The third-party software used in parts is grouped into everything from printers to picosatellites, smart plugs, and operational technology devices. 

Moreover, the Forescout Research Labs found that the AMNESIA:33 vulnerabilities as part of Project Memoria, an leadership that strives at providing the cybersecurity community along with the most extended study on the security of TCP/IP stacks.

Far-Reaching Impact of AMNESIA:33

The TCP/IP stacks are foundational elements of all IP-connected devices, also includes IoT and OT, as they allow basic network communication. And a security flaw in a TCP/IP stack can be very dangerous because a single network packet can be utilized to regulate or crash a device.

The open-source software is usually used in fixed components and IoT/OT devices. However, the source code is re-used in 88% of embedded projects, and its acts as a powerful multiplier for all the vulnerabilities like AMNESIA:33 that are found in installed components.

Apart from all these things, the AMNESIA:33 also affects the multiple open-source TCP/IP stacks that are not reserved by a single company.

The Risks and Attack Scenarios

AMNESIA:33 vulnerabilities can easily enable an attacker to take command of a device, just by using it as:-

  • An entry point on a network
  • A axis point for the oblique movement
  • A persistence point on the target network
  • As a final target of an attack 


According to the experts, in Amnesia:33, there are high efforts required to identify and patch all the vulnerable devices. However, the experts have affirmed some of the best mitigations to identify and patch the vulnerable devices, and here they are mentioned below:-

  • Patch when possible
  • Assess your risk and exposure
  • Monitor for malformed packets
  • Segment to mitigate risk
  • Disable or block IPv6 traffic
  • Rely on internal DNS servers

Apart from this, the security experts also face strong challenges for patching, and here they are mentioned below:-

  • All the patches may be available for embedded elements from the IoT or OT device vendor.
  • Instantly patching embedded elements may void the device manufacturer’s guarantee.
  • A device may be a portion of a mission-critical function or high-availability business process.

Since these vulnerabilities are dangerous, that’s why the security experts specifically mentioned that every user must follow the mitigations properly. While in the meantime they are trying their best to investigate all the key details of these vulnerabilities.

You can follow us on LinkedinTwitterFacebook for daily Cyber security and hacking news updates.

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.