Company News - August 12, 2020
A recent update to many network security monitoring platforms incorrectly identifies many Masterclock network devices as having a critical vulnerability to a set of attack vectors called Ripple20 attributed to the Treck TCP/IP stack.
The vulnerabilities are present in a widely-used TCP/IP stack from Treck, Inc. and affect hundreds of millions of devices of all types around the world where vendors utilized this stack in their embedded systems. Masterclock devices DO NOT USE the Treck TCP/IP stack and the fingerprinting methodology deployed by the scans provides a false positive.