Embedded Devices Open to New Attack
The vulnerability lies in the Arm and XScale microprocessors, two chips that are widely used in these devices. "There are interesting quirks in the ARM and XScale architectures that make things very easy for an attacker," said Juniper's Barnaby Jack.
A successful attacker could run unauthorized software on a device connected to the network. In theory, criminals could use the attack to steal sensitive information from mobile phones or redirect Internet traffic on routers, say from a user's online bank account to a phishing site.
The link for this article located at TECHWORLD is no longer available.