<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Forescout</provider_name><provider_url>https://www.forescout.com</provider_url><author_name>Forescout Research - Vedere Labs</author_name><author_url>https://www.forescout.com/blog/author/forescout-research-labs/</author_url><title>New Critical Operational Technology Vulnerabilities Found on NicheStack &#x2013; Mitigation Advised - Forescout</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="suJL9qs2tD"&gt;&lt;a href="https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/"&gt;New Critical Operational Technology Vulnerabilities Found on NicheStack &#x2013; Mitigation Advised&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/embed/#?secret=suJL9qs2tD" width="600" height="338" title="&#x201C;New Critical Operational Technology Vulnerabilities Found on NicheStack &#x2013; Mitigation Advised&#x201D; &#x2014; Forescout" data-secret="suJL9qs2tD" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.forescout.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.forescout.com/wp-content/uploads/2021/07/FORE0028-INFRA-HALT_-Blog-Header-v2_Social-Card_1200x628.png</thumbnail_url><thumbnail_width>5001</thumbnail_width><thumbnail_height>2618</thumbnail_height><description>Forescout Research Labs&#xA0;and&#xA0;JFrog&#xA0;Security Research have discovered a set of 14 new vulnerabilities affecting the NicheStack TCP/IP stack, which we are collectively calling INFRA:HALT. The new vulnerabilities allow for remote code execution, denial of service, information leak, TCP spoofing, or DNS cache poisoning. NicheStack is used in Operational Technology (OT) devices commonly found in several critical [&hellip;]</description></oembed>
