Multiple RTOS (Update E)
Integer overflow vulnerability in malloc/memory allocation functions affects 31 real-time operating systems and embedded SDKs. Successful exploitation could result in unexpected behavior such as device crash or remote code injection/execution. Affected RTOS include BlackBerry QNX (standard and safety-critical variants), Windriver VxWorks, Texas Instruments SimpleLink, Amazon FreeRTOS, ARM CMSIS-RTOS2 and Mbed OS, NXP MCUXpresso/MQX, Google Cloud IoT Device SDK, Cesanta Mongoose OS, Micrium OS, Redhat newlib, and others. Devices running vulnerable versions prior to the patched releases are at risk of exploitation via network-reachable attack vector.
- Network access to the affected device
- Device must be running a vulnerable RTOS version listed in the advisory
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/095ff8ed-6c1d-4932-8c57-379b88cd4c84Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.