{"id":102115,"date":"2020-06-22T15:32:25","date_gmt":"2020-06-22T22:32:25","guid":{"rendered":"\/blogs\/?p=102115"},"modified":"2025-06-04T02:47:20","modified_gmt":"2025-06-04T09:47:20","slug":"ripple20-vulnerability-mitigation-best-practices","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/","title":{"rendered":"Ripple20 Vulnerability Mitigation Best Practices"},"content":{"rendered":"<p>On June 16<sup>th<\/sup>, the Department of Homeland Security and CISA ICS-CERT <a href=\"https:\/\/www.us-cert.gov\/ics\/advisories\/icsa-20-168-01\" target=\"_blank\" rel=\"noopener noreferrer\">issued<\/a>\u00a0a critical security\u00a0<a href=\"https:\/\/www.kb.cert.org\/vuls\/id\/257161\" target=\"_blank\" rel=\"noopener noreferrer\">advisory<\/a>\u00a0warning covering multiple newly discovered vulnerabilities affecting Internet-connected devices manufactured by multiple vendors. This set of 19 vulnerabilities in a low-level TCP\/IP software library developed by Treck has been dubbed \u201cRipple20\u201d by researchers from JSOF.<\/p>\n<p>A networking stack is a software component that provides network connectivity over the standard internet protocols. In this specific case these protocols include ARP, IP (versions 4 and 6), ICMPv4, UDP and TCP communications protocols, as well as the DNS and DHCP application protocols. The Treck networking stack is used across a broad range of industries (medical, government, academia, utilities, etc.), from a broad range of device manufacturers \u2013 a fact which enhances their impact and scope, as each manufacturer needs to push an update for their devices independently of all others. In other words, the impact ripples out across the industry due to complexities in the supply and design chains.<\/p>\n<p>Identifying vulnerable devices on your network is a crucial step in assessing the risk of Ripple20 to your organization. While a simple <a href=\"https:\/\/www.shodan.io\/search?query=treck\" target=\"_blank\" rel=\"noopener noreferrer\">Shodan search for \u201ctreck\u201d<\/a> shows approximately 1000 devices, which are highly likely to be internet-facing vulnerable devices, this represents only a fraction of the impacted devices. Identification of the Treck networking stack vs. other networking stacks (such as the native Linux or Windows stacks) requires detailed analysis and fingerprinting techniques based on the results of network scans of the devices in question.<\/p>\n<p>The impact of these vulnerabilities ranges from denial of service to full remote code exploitation over the internet, with at least one case not requiring any authentication (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-11901\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-11901<\/a>). JSOF researchers identified that these vulnerabilities impact a combination of traditional and IoT devices. Customers should review advisories from vendors such as <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00295.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel<\/a> and HP because non-IoT devices may be running firmware that makes use of the Treck networking stack.<\/p>\n<p>Ripple20\u2019s most significant impact is to devices whose network stack is exposed (in general IoT devices incorporating the Treck network stack) as compared to devices that incorporate the stack that it is only exposed to the local device. We recommend that you audit all network-enabled devices to determine if they are susceptible to these vulnerabilities.<\/p>\n<p>There are potentially tens of millions of devices that are vulnerable to at least one of the Ripple20 flaws. Mitigating impact requires attention from both device owners and device vendors.<\/p>\n<h2><strong>Mitigations for users of vulnerable devices per CISA recommendations (where possible):\u00a0<\/strong><\/h2>\n<ul>\n<li>Patch any device for which a vendor has released an update.<\/li>\n<li>Practice the principle of least privilege for all users and devices (devices and users should only have access to the set of capabilities needed to accomplish their job). In this case, minimize network exposure and <a href=\"https:\/\/www.us-cert.gov\/ics\/alerts\/ICS-ALERT-10-301-01\" target=\"_blank\" rel=\"noopener noreferrer\">internet-accessibility<\/a> for all control system devices.<\/li>\n<li>Locate control system networks and remote devices behind firewalls and isolate them from the business network.<\/li>\n<li>When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that a VPN is only as secure as the connected devices.\u00a0VPN solutions should use multi-factor authentication.<\/li>\n<li>Use caching DNS servers in your organization, prohibiting direct DNS queries to the internet. Ideally, caching DNS servers should utilize DNS-over-HTTPS for lookups.<\/li>\n<li>Block anomalous IP traffic by utilizing a combination of firewalls and intrusion prevention systems.<\/li>\n<\/ul>\n<h2><strong>Where Can I Go to Get More Information?<\/strong><\/h2>\n<p>Please review <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB93020\" target=\"_blank\" rel=\"noopener noreferrer\">KB93020<\/a> for more information and subscribe for updates.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On June 16th, the Department of Homeland Security and CISA ICS-CERT issued\u00a0a critical security\u00a0advisory\u00a0warning covering multiple newly discovered vulnerabilities affecting&#8230;<\/p>\n","protected":false},"author":1100,"featured_media":102121,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[6024],"class_list":["post-102115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ripple20 Vulnerability Mitigation Best Practices | McAfee Blog<\/title>\n<meta name=\"description\" content=\"On June 16th, the Department of Homeland Security and CISA ICS-CERT issued\u00a0a critical security\u00a0advisory\u00a0warning covering multiple newly discovered\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ripple20 Vulnerability Mitigation Best Practices | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"On June 16th, the Department of Homeland Security and CISA ICS-CERT issued\u00a0a critical security\u00a0advisory\u00a0warning covering multiple newly discovered\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-22T22:32:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T09:47:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration-768x432-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin McGrath\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin McGrath\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/\"},\"author\":{\"name\":\"Kevin McGrath\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7f2523ffdd1024f352148a7a5d621e52\"},\"headline\":\"Ripple20 Vulnerability Mitigation Best Practices\",\"datePublished\":\"2020-06-22T22:32:25+00:00\",\"dateModified\":\"2025-06-04T09:47:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration-768x432-1.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/\",\"name\":\"Ripple20 Vulnerability Mitigation Best Practices | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration-768x432-1.jpg\",\"datePublished\":\"2020-06-22T22:32:25+00:00\",\"dateModified\":\"2025-06-04T09:47:20+00:00\",\"description\":\"On June 16th, the Department of Homeland Security and CISA ICS-CERT issued\u00a0a critical security\u00a0advisory\u00a0warning covering multiple newly discovered\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration-768x432-1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration-768x432-1.jpg\",\"width\":768,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Ripple20 Vulnerability Mitigation Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7f2523ffdd1024f352148a7a5d621e52\",\"name\":\"Kevin McGrath\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/3aa48f8ceb1f6f9ded107d1f0538b93b\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/dmcgrath_headshot-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/dmcgrath_headshot-96x96.jpg\",\"caption\":\"Kevin McGrath\"},\"description\":\"D. Kevin McGrath is a Security Researcher on McAfee\u2019s Advanced Threat Research team, focused on finding new vulnerabilities in both software and hardware. Kevin has a focus on embedded devices, RTOS security, and security education, with emphasis on computer architecture and operating systems.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/kevin-mcgrath\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ripple20 Vulnerability Mitigation Best Practices | McAfee Blog","description":"On June 16th, the Department of Homeland Security and CISA ICS-CERT issued\u00a0a critical security\u00a0advisory\u00a0warning covering multiple newly discovered","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Ripple20 Vulnerability Mitigation Best Practices | McAfee Blog","og_description":"On June 16th, the Department of Homeland Security and CISA ICS-CERT issued\u00a0a critical security\u00a0advisory\u00a0warning covering multiple newly discovered","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-06-22T22:32:25+00:00","article_modified_time":"2025-06-04T09:47:20+00:00","og_image":[{"width":768,"height":432,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration-768x432-1.jpg","type":"image\/jpeg"}],"author":"Kevin McGrath","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Kevin McGrath","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/"},"author":{"name":"Kevin McGrath","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7f2523ffdd1024f352148a7a5d621e52"},"headline":"Ripple20 Vulnerability Mitigation Best Practices","datePublished":"2020-06-22T22:32:25+00:00","dateModified":"2025-06-04T09:47:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/"},"wordCount":585,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration-768x432-1.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/","name":"Ripple20 Vulnerability Mitigation Best Practices | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration-768x432-1.jpg","datePublished":"2020-06-22T22:32:25+00:00","dateModified":"2025-06-04T09:47:20+00:00","description":"On June 16th, the Department of Homeland Security and CISA ICS-CERT issued\u00a0a critical security\u00a0advisory\u00a0warning covering multiple newly discovered","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration-768x432-1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration-768x432-1.jpg","width":768,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ripple20-vulnerability-mitigation-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Ripple20 Vulnerability Mitigation Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7f2523ffdd1024f352148a7a5d621e52","name":"Kevin McGrath","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/3aa48f8ceb1f6f9ded107d1f0538b93b","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/dmcgrath_headshot-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/01\/dmcgrath_headshot-96x96.jpg","caption":"Kevin McGrath"},"description":"D. Kevin McGrath is a Security Researcher on McAfee\u2019s Advanced Threat Research team, focused on finding new vulnerabilities in both software and hardware. Kevin has a focus on embedded devices, RTOS security, and security education, with emphasis on computer architecture and operating systems.","url":"https:\/\/www.mcafee.com\/blogs\/author\/kevin-mcgrath\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/102115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1100"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=102115"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/102115\/revisions"}],"predecessor-version":[{"id":215091,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/102115\/revisions\/215091"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/102121"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=102115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=102115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=102115"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=102115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}