This document summarizes research into the resilience of deployed TCP implementations to "blind" in-window attacks from off-path adversaries. The authors tested major operating systems and network infrastructure and found that:
1) Over 50% of web server connections were vulnerable to at least one blind in-window attack, with 44% accepting invalid data packets.
2) All routers and switches tested had some form of TCP vulnerability, despite more recent systems being resistant to SYN and reset attacks.
3) Ephemeral port selection on real systems remains predictable, potentially aiding attackers, though adoption of new operating systems may improve this over time.