Embedded Systems

 

A TIMESYS DEEP DIVE

 

February 2024

Cybersecurity in the news

Critical Alert: “Leaky Vessels” Vulnerability Threatens Container Isolation Across Docker and runc

This month, three critical vulnerabilities have emerged, posing significant threats to embedded software platforms and Linux distributions. These vulnerabilities, if exploited, could allow attackers to bypass security measures, gain unauthorized access, and potentially take control of affected systems. Immediate action is recommended to mitigate these risks.

Leaky Vessels: Escaping Docker and runc Containers

A series of vulnerabilities collectively known as “Leaky Vessels” have been identified, allowing attackers to escape Docker and runc containers. Discovered by Snyk’s security researchers, these flaws can enable unauthorized access to the host operating system, compromising the security of the entire system. The vulnerabilities affect a wide range of container management software, making swift patching essential.

Elevating Privileges: glibc Flaw in Linux Distributions

CVE-2023-6246, a newly disclosed vulnerability within the GNU C Library (glibc), allows unprivileged attackers to gain root access across multiple major Linux distributions. This local privilege escalation vulnerability stems from a heap-based buffer overflow, highlighting the need for immediate system updates to prevent potential exploits.

Affected distributions include Debian, Ubuntu, and Fedora, with the possibility of broader impact across other Linux systems.

 

Shim Bootloader Vulnerability: CVE-2023-40547

The discovery of CVE-2023-40547 in the shim bootloader—a critical component in the Linux boot process supporting Secure Boot—has raised alarms. This vulnerability can lead to complete system compromise before the kernel loads, offering attackers a high level of control over the affected systems.

This issue not only affects Red Hat but has widespread implications for all Linux distributions that support Secure Boot. Immediate updates to the UEFI Secure Boot DBX and the shim software are crucial to protect against potential exploits.

CVE-2023-40546 to CVE-2023-40551: Accompanying vulnerabilities with medium severity, also requiring attention.

 

With an average of 420 new CVEs every week, how do you cut through the noise and take action on the vulnerabilities that pose the largest threat to your device?

We launched the Timesys CVE Dashboard and update it weekly with details on the dangerous security vulnerabilities that could be affecting your device.

Secure Your Future

Master the Cyber Resilience Act with Long Term Linux OS and BSP Maintenance

In the face of the European Cyber Resilience Act’s stringent cybersecurity demands, medical device manufacturers are finding themselves at a crossroads. Achieving and maintaining compliance requires a proactive, knowledgeable partner. Enter Timesys, your ally in navigating these complex regulations with our Long Term Linux OS and BSP Maintenance service.

Why Choose Long Term OS and BSP Maintenance?

  • Stay Ahead of Regulations: Continuous updates ensure your devices remain compliant, without the overhead of constant vigilance.
  • Expert Support: Leverage our two decades of embedded software expertise to secure your devices against evolving threats.
  • Cost-Effective Solution: Minimize the risk of penalties and reduce the need for in-house security experts, allowing you to focus on innovation.

Transform compliance from a challenge into your competitive advantage. Visit our product page to learn how our service can simplify your path to CRA compliance and beyond.

Elevate Your IT Infrastructure

LYNX MOSA.ic: Where Open Source Meets Unmatched Security and Efficiency

– Addressing US Government program delays with LYNX MOSA.ic, leveraging open standards for manageable, secure, and efficient system integration.
– MOSA.ic’s architecture supports a variety of operating systems, enabling simplified software stack complexity and rapid development.
See how LYNX MOSA.ic combines open source flexibility with unparalleled security and efficiency.

Elevate Your Embedded Security and Performance

VigiShield: The Key to Secure, Swift Development on TI Sitara AM 625x

Navigating the complexities of embedded system security can be daunting, especially when your innovation hinges on the advanced capabilities of the TI Sitara AM 625x. With cyber threats evolving at an unprecedented pace, ensuring your project’s integrity while maintaining a swift development cycle is a challenge many face.

Introducing VigiShield by Timesys – your solution to embedding uncompromised security directly into your development process. VigiShield leverages the power of the TI Sitara AM 625x to offer:

  • Custom-Fit Security Solutions: Seamlessly integrate robust security that complements the performance of your TI Sitara AM 625x projects without the complexity.
  • Streamlined Compliance: Meet industry standards effortlessly, ensuring your product’s market readiness.
  • Accelerated Innovation: Focus on what you do best, while we secure your back.

Take the first step: Dive into a secure future with an exclusive VigiShield security consultation web meeting. Secure, innovate, and lead with confidence.

Explore VigiShield Now – Your blueprint for secure and innovative embedded solutions.

Learn with Timesys

Everything You Should Know About KEVs & How They Differ From CVEs

Timesys-India-Team-Goa

Why should KEVs demand your immediate attention, and how do they differ from the CVEs you’re already familiar with? Uncover the nuances that set KEVs apart and the real threats they pose to embedded Linux, Yocto, and medical devices. With our expert guide, you’ll learn the best practices for detecting, mitigating, and ultimately enhancing your device security against these exploited vulnerabilities. Dive into the full discussion to prioritize your security efforts effectively.

Discover how to fortify your devices against KEVs. Read our comprehensive guide now and take a proactive stance in securing your technology for the future:

Upcoming

Events Around The World You Don’t Want To Miss

timesys embedded board farm zombies<br />

NVIDIA GTC 2024: AI Conference & Expo

When? Monday, March 18 to Thursday, March 21
Where? At the San Jose Convention Center (San Jose, CA, USA) and Virtually

Come connect with a dream team of industry luminaries, developers, researchers, and business strategists helping shape what’s next in AI and accelerated computing. At this year’s NVIDIA GTC, there will be over 900 inspiring sessions, 300+ exhibits, 20+ technical workshops covering generative AI, and Timesys and Lynx Software Technologies!

Aerospace TechWeek Europe

When? Wednesday, April 17 to Thursday, April 18

Where? In Hall 4, MOC Event Center Messe München in Munich, Germany

Don’t miss this exciting opportunity for avionics, airlines, aircraft makers, and their partners to connect, innovate, and discover new ways of generating solutions in our rapidly evolving world. In addition, our Director of EMEA Open Source and Commercial Programs at Timesys, Maciej Halasz, and our CEO, Michel Genard, will be guest speakers at this event!

Vulnerability Management for Embedded

Tools & Techniques to Monitor and Remediate Vulnerabilities in Your SBOM

timesys embedded board farm zombies<br />

March 28 @ 12 PM EDT / 9 AM PT

In this monthly live webinar and Q&A session, you’ll learn essential ways to avoid a five-figure mistake along with:

– Why you need to manage your open-source software risks 
– How to generate an accurate SBOM (Software Bills of Materials) and why it matters
– Tools and techniques to monitor and remediate vulnerabilities in your SBOM
– And much more!

Learn More

PixieFail: 9 Vulnerabilities in Tianocore’s EDK II IPv6 Network Stack
 

January 2024

PixieFail: 9 Vulnerabilities in Tianocore’s EDK II IPv6 Network Stack

Windows and Linux devices can be hacked by malicious logo images
 

December 2023

Windows and Linux devices can be hacked by malicious logo images

Managing the Growing Tsunami of Vulnerabilities
 

November 2023

Managing the Growing Tsunami of Vulnerabilities

Worst Security Problem Found in cURL” Highlights Need for SBOMs and 1-Click Remote Attack CVE Discovered in libcue

October 2023

Worst Security Problem Found in cURL” Highlights Need for SBOMs and 1-Click Remote Attack CVE Discovered in libcue