Millions of IoT Devices Exposed to Hacking Due to Amnesia:33 Vulnerability, Research Shows

Potentially affected devices from an estimated 150 manufacturers range from smart plugs and printers to healthcare appliances.

Advertisement
By Associated Press | Updated: 9 December 2020 16:04 IST
Highlights
  • Fixing vulnerabilities in impacted devices is particularly complicated
  • Open-source software isn't owned by anyone
  • It is up to the device manufacturers themselves to patch the flaws

The company discovered the vulnerabilities in the largest study ever on the security of TCP/IP software

Researchers at a cybersecurity firm say they have identified vulnerabilities in software widely used by millions of connected devices — flaws that could be exploited by hackers to penetrate business and home computer networks and disrupt them.

There is no evidence of any intrusions that made use of these vulnerabilities. But their existence in data-communications software central to Internet-connected devices prompted the US Cybersecurity and Infrastructure Security Agency to flag the issue in an advisory.

Potentially affected devices from an estimated 150 manufacturers range from networked thermometers to “smart” plugs and printers to office routers and healthcare appliances to components of industrial control systems, the cybersecurity firm Forescout Technologies said in a report released Tuesday. Most affected are consumer devices including remote-controlled temperature sensors and cameras, it said.

Advertisement

In the worst case, control systems that drive "critical services to society" such as water, power and automated building management could be crippled, said Awais Rashid, a computer scientist at Bristol University in Britain who reviewed the Forescout findings.

Advertisement

In its advisory, CISA recommended defensive measures to minimise the risk of hacking. In particular, it said industrial control systems should not be accessible from the internet and should be isolated from corporate networks.

The discovery highlights the dangers that cybersecurity experts often find in Internet-linked appliances designed without much attention to security. Sloppy programming by developers is the main issue in this case, Rashid said.

Advertisement

Addressing the problems, estimated to afflict millions of devices, is particularly complicated because they reside in so-called open-source software, code freely distributed for use and further modification. In this case, the issue involves fundamental internet software that manages communications via a technology called TCP/IP.

Fixing the vulnerabilities in impacted devices is particularly complicated because open-source software isn't owned by anyone, said Elisa Costante, Forescout's vice president of research. Such code is often maintained by volunteers. Some of the vulnerable TCP/IP code is two decades old; some of it is no longer supported, Costante added.

Advertisement

It is up to the device manufacturers themselves to patch the flaws and some may not bother given the time and expense required, she said. Some of the compromised code is embedded in a component from a supplier — and if no one documented that, no one may even know it's there.

“The biggest challenge comes in finding out what you've got,” Rashid said.

If unfixed, the vulnerabilities could leave corporate networks open to crippling denial-of-service attacks, ransomware delivery or malware that hijacks devices and enlists them in zombie botnets, the researchers said. With so many people working from home during the pandemic, home networks could be compromised and used as channels into corporate networks through remote-access connections.

Forescout notified as many vendors as it could about the vulnerabilities, which it dubbed AMNESIA:33. But it was impossible to identify all affected devices, Costante said. The company also alerted U.S., German and Japanese computer security authorities, she said.

The company discovered the vulnerabilities in what it called the largest study ever on the security of TCP/IP software, a year-long effort it called Project Memoria.


Are Micromax In 1b, In Note 1 good enough to take the brand to the top in India?? We discussed this on Orbital, our weekly technology podcast, which you can subscribe to via Apple Podcasts, Google Podcasts, or RSS, download the episode, or just hit the play button below.

Affiliate links may be automatically generated - see our ethics statement for details.
 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: IoT, hacking
Advertisement

Related Stories

Popular Mobile Brands
  1. Oppo A6i+ 5G, A6v 5G With 50-Megapixel Cameras Launched at These Prices
  2. Sony Has Patented a PlayStation Controller Design Without Any Buttons
  3. Realme Buds Air 8 Review: Big on Features, but There's A Catch
  1. Scientists Discover Cosmic Clock in Zircon Crystals That Tracks Earth’s Landscape History
  2. NASA Confirms Axiom Mission 5 Private Astronaut Launch to ISS in Early 2027
  3. Mountain Climbing Indie Game Cairn Sells 200,000 Copies on PC, PS5 in 3 Days
  4. Sony WF-1000XM6 Price, Launch Timeline and Key Specifications Leaked
  5. Vivo Y21 5G and Vivo Y11d Listed on Malaysia's SIRIM Database, Might Launch Soon
  6. UK Watchdog Wants Google to Let Publishers Opt Out of AI Overviews
  7. Budget 2026: Government Proposes Penalties for Inaccurate Reporting of Crypto Assets
  8. Om Shanti Shanti Shantihi OTT Release Reportedly Revealed Online: What You Need to Know
  9. Cristina Kathirvelan Now Available for Streaming on Tentkotta and Aha Tamil
  10. Samsung Galaxy S26 Series Will Reportedly Support Google's Pixel-Exclusive Scam Detection Feature
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.