{"id":8495,"date":"2020-06-23T12:42:17","date_gmt":"2020-06-23T09:42:17","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8495"},"modified":"2020-06-23T12:42:17","modified_gmt":"2020-06-23T09:42:17","slug":"ripple20-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ripple20-vulnerabilities\/8495\/","title":{"rendered":"Ripple20: Milyonlarca Nesnelerin \u0130nterneti cihaz\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131"},"content":{"rendered":"<p>\u0130srail \u015firketi JSOF uzmanlar\u0131, y\u00fczlerce milyonlarca Nesnelerin \u0130nterneti (IoT) cihaz\u0131n\u0131 etkileyen 19 s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ke\u015ffetti. Bu durumun en k\u00f6t\u00fc yan\u0131, baz\u0131 cihazlar\u0131n hi\u00e7bir zaman g\u00fcncelleme alamayacak olmas\u0131d\u0131r. T\u00fcm g\u00fcvenlik a\u00e7\u0131klar\u0131, \u015firketin yirmi y\u0131l\u0131 a\u015fk\u0131n bir s\u00fcredir geli\u015ftirdi\u011fi Treck Inc.\u2019in TCP\/IP k\u00fct\u00fcphanesinde bulundu. G\u00fcvenlik a\u00e7\u0131klar\u0131 k\u00fcmesine Ripple20 ad\u0131 verildi.<\/p>\n<h2>Bu durum sizi nas\u0131l etkiler?<\/h2>\n<p>Treck\u2019i veya TCP\/IP k\u00fct\u00fcphanesini hi\u00e7 duymam\u0131\u015f olabilirsiniz, ancak etkilenen cihaz ve sat\u0131c\u0131lar\u0131n say\u0131s\u0131 g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda \u015firket a\u011f\u0131n\u0131zda muhtemelen en az bir tane bulunuyor. TCP\/IP k\u00fct\u00fcphanesinde her t\u00fcrl\u00fc Nesnelerin \u0130nterneti \u00e7\u00f6z\u00fcm\u00fc yer al\u0131yor. Bu da savunmas\u0131z Nesnelerin \u0130nterneti cihazlar\u0131na ev ve ofis yaz\u0131c\u0131lar\u0131ndan end\u00fcstriyel ve t\u0131bbi ekipmanlara kadar olan \u00f6\u011felerin dahil oldu\u011fu anlam\u0131na geliyor.<\/p>\n<p>Treck\u2019in olu\u015fturulmas\u0131, cihazlar\u0131n \u0130nternet ile etkile\u015fime girmesine izin veren d\u00fc\u015f\u00fck seviyeli bir k\u00fct\u00fcphanedir. Son 20 y\u0131lda, ilk s\u00fcr\u00fcm\u00fcn piyasaya s\u00fcr\u00fclmesinden bu yana k\u00fct\u00fcphane \u00e7ok say\u0131da \u015firket taraf\u0131ndan kullan\u0131ld\u0131. \u00c7o\u011fu zaman haz\u0131r bir k\u00fct\u00fcphane almak, \u015firketler i\u00e7in kendi k\u00fct\u00fcphanenizi geli\u015ftirmekten daha kolayd\u0131r. Baz\u0131 \u015firketler, bu k\u00fct\u00fcphaneleri basit\u00e7e uygulad\u0131 fakat di\u011fer \u015firketler ihtiya\u00e7lar\u0131na uyacak \u015fekilde k\u00fct\u00fcphaneleri de\u011fi\u015ftirdiler veya di\u011fer k\u00fct\u00fcphanelere g\u00f6md\u00fcler.<\/p>\n<p>Ayr\u0131ca, ara\u015ft\u0131rmac\u0131lar Ripple20\u2019den etkilenen \u015firketleri ararken, k\u00fct\u00fcphanenin orijinal al\u0131c\u0131s\u0131n\u0131n ad\u0131n\u0131 de\u011fi\u015ftirdi\u011fi birka\u00e7 durum buldular. Baz\u0131 durumlarda ise ba\u015fka bir \u015firket taraf\u0131ndan devrelanm\u0131\u015ft\u0131r. Bu nedenle, bu k\u00fct\u00fcphaneyi kullanan ger\u00e7ek cihaz say\u0131s\u0131n\u0131 de\u011ferlendirmek kolay de\u011fildir. \u201cY\u00fcz milyonlarca\u201d kabaca belirlenmi\u015f bir \u00f6n tahmindir. Milyarlarca bile olabilir.<\/p>\n<p>Bu olduk\u00e7a karma\u015f\u0131k tedarik zinciri, baz\u0131 cihazlara hi\u00e7bir zaman yama yap\u0131lamamas\u0131n\u0131n nedenidir.<\/p>\n<h2>G\u00fcvenlik a\u00e7\u0131klar\u0131 nelerdir ve nas\u0131l tehlikelidir?<\/h2>\n<p>Ripple20 \u015femsiye ad\u0131, de\u011fi\u015fen derecelerde kritiklikte toplam 19 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kapsar. Ara\u015ft\u0131rmac\u0131lar hen\u00fcz t\u00fcm teknik detaylar\u0131 a\u00e7\u0131klamad\u0131 fakat yaz sonunda bir Black Hat konferans\u0131nda yapmay\u0131 planl\u0131yorlar. Bununla birlikte, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n en az d\u00f6rd\u00fcn\u00fcn kritik oldu\u011fu ve <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVSS puan\u0131n\u0131n<\/a> 9.0\u2019dan y\u00fcksek oldu\u011fu ediliyor.<\/p>\n<p>K\u00fct\u00fcphanenin en son s\u00fcr\u00fcm\u00fcnde bulunmayan d\u00f6rt g\u00fcvenlik a\u00e7\u0131\u011f\u0131 hala cihazlarda kullan\u0131lan \u00f6nceki yinelemelerde g\u00f6r\u00fcn\u00fcyor. K\u00fct\u00fcphane g\u00fcvenlik d\u0131\u015f\u0131ndaki nedenlerle g\u00fcncellendi ve bir\u00e7ok tedarik\u00e7i eski s\u00fcr\u00fcmleri kullanmaya devam etti.<\/p>\n<p>JSOF\u2019a g\u00f6re, bu g\u00fcvenlik a\u00e7\u0131klar\u0131ndan baz\u0131lar\u0131 y\u0131llarca fark edilmeden gizlenen sald\u0131rganlar\u0131n bir cihaz\u0131n tam kontrol\u00fcn\u00fc ele ge\u00e7irmesine ve yaz\u0131c\u0131lardan veri \u00e7almak veya cihaz davran\u0131\u015f\u0131n\u0131 de\u011fi\u015ftirmek i\u00e7in kullanmas\u0131na izin verir. \u0130ki kritik a\u00e7\u0131k, rastgele kodun uzaktan y\u00fcr\u00fct\u00fclmesine izin verir. G\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n bir listesi ve video demosu <a href=\"https:\/\/www.jsof-tech.com\/ripple20\/#ripple-whitepaper\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ara\u015ft\u0131rmac\u0131lar\u0131n internet sitesinde<\/a> bulunuyor.<\/p>\n<h2>Peki ne yapmal\u0131<\/h2>\n<p>Treck TCP\/IP kitapl\u0131\u011f\u0131n\u0131 kullanan \u015firketler i\u00e7in ara\u015ft\u0131rmac\u0131lar, <a href=\"https:\/\/treck.com\/contact\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">geli\u015ftiricilere ba\u015fvurman\u0131z\u0131<\/a> ve kitapl\u0131\u011f\u0131 en son s\u00fcr\u00fcme g\u00fcncellemenizi \u00f6neriyor. Bu m\u00fcmk\u00fcn de\u011filse, cihazlardaki t\u00fcm savunmas\u0131z i\u015flevleri devre d\u0131\u015f\u0131 b\u0131rak\u0131n.<\/p>\n<p>G\u00fcnl\u00fck i\u015flerinde savunmas\u0131z cihazlar kullanan \u015firketlere gelince, bu \u015firketler g\u00f6zlerini korkutan bir g\u00f6revle kar\u015f\u0131 kar\u015f\u0131yad\u0131rlar. Ba\u015flang\u0131\u00e7ta kulland\u0131klar\u0131 herhangi bir ekipmanda g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n olup olmad\u0131\u011f\u0131n\u0131 belirlemeleri gerekir. Bunu yapmak g\u00f6r\u00fcnd\u00fc\u011f\u00fc kadar basit de\u011fildir ve b\u00f6lgesel CERT merkezlerinin veya sat\u0131c\u0131lar\u0131n\u0131n yard\u0131m\u0131n\u0131 gerektirebilir. Ayr\u0131ca, \u015firketlere a\u015fa\u011f\u0131dakiler \u00f6nerilir:<\/p>\n<ul>\n<li>T\u00fcm cihazlar\u0131n \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131 g\u00fcncelleyin (yeni g\u00fcvenlik a\u00e7\u0131klar\u0131ndan ba\u011f\u0131ms\u0131z olarak her zaman \u00f6nerilir).<\/li>\n<li>Kritik Nesnelerin \u0130nterneti cihazlar\u0131n\u0131n \u0130nternet eri\u015fimini en aza indirin;<\/li>\n<li>Ofis a\u011f\u0131n\u0131 bu t\u00fcr cihazlar\u0131n kullan\u0131ld\u0131\u011f\u0131 a\u011flardan ay\u0131r\u0131n (unutulmamas\u0131 gereken ipucu: Ne olursa olsun bunu her zaman yap\u0131n);<\/li>\n<li>Nesnelerin \u0130nterneti cihazlar\u0131n\u0131n kullan\u0131ld\u0131\u011f\u0131 a\u011flardaki DNS proxy\u2019lerini yap\u0131land\u0131r\u0131n.<\/li>\n<\/ul>\n<p>Bizim a\u00e7\u0131m\u0131zdan, \u015firket a\u011f\u0131ndaki anormal etkinli\u011fi tespit edebilen g\u00fcvenilir bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc kullanman\u0131z\u0131 \u00f6neririz. \u00d6rne\u011fin, bu etkinlikleri tespit etmek <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-management-defense-solution?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____tmd___\" target=\"_blank\" rel=\"noopener\">Kaspersky Threat Management and Defense \u00e7\u00f6z\u00fcm\u00fcm\u00fcz\u00fcn<\/a> bir\u00e7ok faydas\u0131ndan biridir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0130srailli uzmanlar y\u00fcz milyonlarca IoT cihaz\u0131n\u0131n kritik g\u00fcvenlik a\u00e7\u0131klar\u0131 i\u00e7erdi\u011fini iddia ediyor ve bu en kendisinin en iyimser tahmini.<\/p>\n","protected":false},"author":2581,"featured_media":8499,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1351],"tags":[790,629,1063],"class_list":{"0":"post-8495","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-threats","10":"tag-guvenlik-aciklari","11":"tag-iot","12":"tag-nesnelerin-interneti"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ripple20-vulnerabilities\/8495\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ripple20-vulnerabilities\/21475\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ripple20-vulnerabilities\/16944\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ripple20-vulnerabilities\/8391\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ripple20-vulnerabilities\/22649\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ripple20-vulnerabilities\/20764\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ripple20-vulnerabilities\/19132\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ripple20-vulnerabilities\/23000\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ripple20-vulnerabilities\/22053\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ripple20-vulnerabilities\/28622\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ripple20-vulnerabilities\/35974\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ripple20-vulnerabilities\/15148\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ripple20-vulnerabilities\/15645\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ripple20-vulnerabilities\/13598\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ripple20-vulnerabilities\/24321\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ripple20-vulnerabilities\/28699\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ripple20-vulnerabilities\/25594\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ripple20-vulnerabilities\/22513\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ripple20-vulnerabilities\/27758\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ripple20-vulnerabilities\/27599\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guvenlik-aciklari\/","name":"g\u00fcvenlik a\u00e7\u0131klar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8495"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8495\/revisions"}],"predecessor-version":[{"id":8503,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8495\/revisions\/8503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8499"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}