If you want an object lesson in the dangers that await us on the Internet of Things, check out SEC Consult’s write up on NetUSB, a widely used technology developed by an obscure Taiwanese company that just happens to contain a nasty, remotely exploitable vulnerability. According to this alert, published on Tuesday, NetUSB “suffers from a remotely exploitable kernel stack buffer overflow” that could be used to run malicious code on affected devices. Even worse: the NetUSB component is ubiquitous – found in a long list of devices, from low-end wireless access points and broadband routers for small office and home office deployments to what SEC Consult called “high end devices…released very recently.” Networking devices from 26 vendors, including TP-Link, NetGear and others were found to use the NetUSB technology in their products. The vulnerability discovered by SEC Consult is straight-forward enough. According to their advisory, the NetUSB code does an inadequate […]Read more ›
Post Tagged with: "Government"
In-brief: Did security researcher Chris Roberts attempt to tamper with in-flight systems during a United Airlines flight from Denver to Chicago in April? An FBI affidavit says “yes,” Roberts says “no way.” Like this:Like Loading…Read more ›
In-brief: Researchers from the University of Washington demonstrated attacks against “a slew” of exploitable vulnerabilities in a surgical robot they helped develop. They included attacks that could cause “jerky motion of robot’s arms” or render the surgical robot “motionless” and “almost unusable.” Like this:Like Loading…Read more ›