BACKGROUND:
Researchers at Forescout have today disclosed a new set of critical Nucleus Net vulnerabilities, dubbed NUCLEUS:13.
The vulnerabilities, which may be present in millions of devices that deploy the code owned by Siemens, could cause remote code execution, denial of service attacks and data leak. The Nucleus TCP / IP stack, originally released in 1993, is still widely used in critical safety devices operated by hospitals and the healthcare industry, including anaesthesia machines, patient monitors, building automation systems, lighting controls and ventilation. If exploited, bad actors can use them to take target devices offline or assume control of healthcare operations.
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.