Company
Date Published
Author
Asaf Karas, Shachar Menashe and Denys Vozniuk
Word count
1235
Language
English
Hacker News points
None

Summary

NicheStack, a widely-used TCP/IP network stack in operational technology devices, has been found to contain 14 new security vulnerabilities by JFrog's security research team and Forescout Research Labs. These vulnerabilities, collectively named INFRA:HALT, could lead to remote code execution, denial of service, information leaks, TCP spoofing, and DNS cache poisoning. The vulnerabilities affect all NicheStack versions before 4.3, including NicheLite, and are found in various components such as DNSv4 clients and HTTP servers. To mitigate these risks, upgrading to NicheStack v4.3 is recommended, or alternatively, using open-source scripts to detect vulnerable devices, segmenting them from networks, and monitoring traffic for malicious activity. JFrog and Forescout are engaging with impacted vendors to prepare community advisories and will host webinars and talks to further discuss the findings and mitigation strategies.