Many vendors are responding to design vulnerabilities in TCP/IP protocol stack that could allow unauthorized access among many software & OEM vendors.  All products should be promptly patched as security updates become available.

https://us-cert.cisa.gov/ncas/current-activity/2020/12/08/certcc-releases-information-vulnerabilities-affecting-open-source

CISA & US/CERT have released information on 33 vulnerabilities, known as AMNESIA:33, affecting multiple embedded open-source Transmission Control Protocol/Internet Protocol (TCP/IP) stacks. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.  CISA encourages users and administrators to review CERT/CC VulnerabilityVU #815128and CISA Advisory ICSA-20-343-01 for more information and to apply the recommended mitigations. Refer to vendors for appropriate patches, when available.