Ripple20 is particularly worrisome to medical devices, a new report asserts, with the 19 critical vulnerabilities detected in more than 52,000 equipment models.

First reported by security researchers JSOF in mid-June, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency followed the report with an alert that detailed potential exploits hackers could take to gain control of an affected device. According to reports, the vulnerabilities exist in the widely used, low-level TCP/IP software library developed by Treck, which includes multiple remote code execution possibilities. Ohio-based developer Treck provides low-level network protocols for embedded devices. 

Most of the flaws are caused by bugs in its memory management, as well as “historically related KASAGO TCP/IP middleware from Zuken Elmic (formerly Elmic Systems).” The highest risk vulnerabilities could allow an attacker to steal data, impact the function of connected devices, or prompt a device malfunction, among a host of other malicious activities. 

Read the full article on Health IT Security.