High-Severity Vulnerabilities Discovered in Multiple Embedded TCP/IP Stacks

A long-known implementation error in the Transmission Control Protocol (TCP) that network devices use to communicate with each other continues to persist in TCP/IP stacks used in millions of IT, OT, and IoT devices. The vulnerabilities give attackers a way to hijack TCP connections, close them, spoof packets, bypass authentication, and inject data into network traffic.

Read full article on Dark Reading

 


Date:

Categorie(s):