Millions of Devices Affected by DNS Failures NAME: WRECK

There are many vulnerabilities that can put our systems and devices at risk. These flaws could be exploited by hackers to carry out their attacks. Therefore, we must at all times be aware of possible updates that help correct the problem. In this article we echo the DNS vulnerabilities called NAME: WRECK . They affect more than 100 million devices.

DNS NAME: WRECK vulnerabilities affect millions of devices

A group of security researchers has detected a series of vulnerabilities that affect the DNS. In total, they have detected nine flaws in popular TCP / IP network communication stacks used by more than 100 million devices. Therefore we are facing an important problem that could affect many users.


These failures have been named as NAME: WRECK. In the event that an attacker exploited these vulnerabilities, they could take full control of the devices and disconnect them. As we have noted, these flaws have been found in popular TCP / IP stacks that run on a wide range of products. Here we can include high performance servers or network equipment.

This discovery has been made by the security company Enterprise of Things Forescout and the computer security research group JSOF, based in Israel. It affects several widely used TCP / IP stacks such as the following that we are going to show.

  • FreeBSD (vulnerable version 12.1) – This is one of the most popular operating systems in the BSD family.
  • IPnet (vulnerable version VxWorks 6.6) – Initially developed by Interpeak, now under WindRiver maintenance and used by the VxWorks operating system.
  • NetX (Vulnerable version 6.0.1): It is part of ThreadX RTOS and is now an open source project maintained by Microsoft under the name Azure RTOS NetX.
  • Nucleus NET (Vulnerable Version 4.3) – Part of Nucleus RTOS maintained by Mentor Graphics, a Siemens company, is used in medical, industrial, consumer, aerospace, and Internet of Things devices.

An attacker could exploit any of these NAME: WRECK vulnerabilities and attack corporate or government servers, hospital facilities, and many other smaller organizations. They could obtain confidential data, modify the operation or even make it unavailable.

Métodos de seguridad en dispositivos IoT

All NAME: WRECK vulnerabilities can be exploited

However, from Forescout they indicate that not all NAME: WRECK vulnerabilities can be exploited and achieve the same results. Of course, the impact on the most serious bugs can be remote code execution and they have obtained a severity score of 9.8 out of 10.

Looking at the nine discovered vulnerabilities, the severity score ranges from 5.3 to 9.8. Specifically, they are the following:

  • CVE-2020-7461 with a severity of 7.7
  • CVE-2016-20009 with a severity of 9.8
  • CVE-2020-15795 with a severity of 8.1
  • CVE-2020-27009 with a severity of 8.1
  • CVE-2020-27736 with a severity of 6.5
  • CVE-2020-27737 with a severity of 6.5
  • CVE-2020-27738 with a severity of 6.5
  • CVE-2021-25677 with a severity of 5.3

As we can see, not all vulnerabilities have the same severity. Of course, we must always keep the equipment updated. There are many bugs that can arise and that could compromise our security and privacy. We should install the latest versions whenever possible.