Home IoT Security A zero-day bug found in the uClibic library leads to IoT devices being vulnerable to DNS poisoning attacks.

A zero-day bug found in the uClibic library leads to IoT devices being vulnerable to DNS poisoning attacks.

by Sriram Parisa
A zero-day bug found in the uClibic library

A zero-day bug was found in the uClibic library, which is a library intended for Linux-based operating systems for embedded systems like IoT devices. The bug named ICS-VU-638779 is not yet patched, which may lead to a DNS poisoning attack.

The attacker can use DNS poisoning or DNS spoofing and also known as DNS cache poisoning, to redirect the victim to a malicious website controlled by an attacker.

A zero-day bug found in the uClibic library
IoT devices are vulnerable to DNS poisoning attacks.

In the sight of the Nozomi networks, it is not currently available to the developer of uClibc, leaving more than 200 vendors at risk.

The DNS poisoning attack provides to act by translating domain names into IP addresses. Nozomi warned the uClibic library has some peculiar is going on. After investigation, the analysts found that the DNS lookup request’s transaction ID was guessable.

The attackers steal the information and use it to compromise the device for other attacks.

Nozomi found the flaw and informed the CISA. then CERT reported to the coordination center and finally, in January 2022 it disclosed the bug that over 200 vendors were impacted.

In this digital world, we keep an eye on the updates and frameworks released by vendors.

Related Posts

Leave a Comment

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00
Update Required Flash plugin
-
00:00
00:00