Embedded Systems

 

A TIMESYS DEEP DIVE

 

January 2024

For an audio version of this newsletter to listen to, click below!

Cybersecurity in the news

PixieFail: 9 Vulnerabilities in Tianocore’s EDK II IPv6 Network Stack

According to Quarkslab, nine (9) new vulnerabilities have been discovered that affect “the IPv6 network protocol stack of EDK II, TianoCore’s open source reference implementation of UEFI.” These vulnerabilities “can be exploited by unauthenticated remote attackers on the same local network, and in some cases, by attackers on remote networks.” In addition, these vulnerabilities could result in “denial of service, information leakage, remote code execution, DNS cache poisoning, and network session hijacking.”

CVE-2023-45229

Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message

 

CVE-2023-45230

Buffer overflow in the DHCPv6 client via a long Server ID option

 

CVE-2023-45231

Out of Bounds read when handling a ND Redirect message with truncated options

 

CVE-2023-45232

Infinite loop when parsing unknown options in the Destination Options header

 

CVE-2023-45233

Infinite loop when parsing a PadN option in the Destination Options header

 

CVE-2023-45234

Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message

 

CVE-2023-45235

Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message

 

CVE-2023-45236

Predictable TCP Initial Sequence Numbers

 

CVE-2023-45237

Use of a Weak PseudoRandom Number Generator

 

With an average of 420 new CVEs every week, how do you cut through the noise and take action on the vulnerabilities that pose the largest threat to your device?

We launched the Timesys CVE Dashboard and update it weekly with details on the dangerous security vulnerabilities that could be affecting your device.

Secure with Confidence

Vigiles Adds Critical KEV Catalog for Unmatched Protection

In our continuous effort to provide the most comprehensive security tools for embedded Linux developers, Timesys proudly announces a significant update to Vigiles: the integration of the Known Exploited Vulnerabilities (KEV) catalog maintained by CISA directly into our CVE reports.

Timely and effective mitigation begins with understanding the status of vulnerabilities. This integration allows your team to easily identify vulnerabilities that have been actively exploited by enriching your CVE reports with the status assigned by NVD, alongside the addition of the KEV catalog.

This enhancement provides a clearer picture of the threat landscape, enabling a more strategic approach to vulnerability management. Focus your resources on the vulnerabilities that pose the greatest risk to your products, ensuring optimal security with enhanced insight and control.

Learn with Lynx Software Technologies

Overcoming Challenges, Embracing Innovation, and Redefining Business Models with Artificial Intelligence (AI) in Aviation

In this new era of “digital transformation,” how is the rapid rise of generative AI (GenAI) redefining and impacting every business, department, and operation – especially aviation? In this blog by Lynx Software Technologies, explore the profound impact of GenAI across various aspects of the industry, from enhancing in-flight refueling to revolutionizing ground operations at airports. Discover how AI analysis of aircraft information is even optimizing predictive maintenance, potentially saving both money and lives!

Evolving Industry Regulations

The PATCH Act: A New Era for Healthcare IoT Security

As the healthcare industry increasingly integrates IoT technology into its operations, the cybersecurity of these devices has never been more critical. The Protecting and Transforming Cyber Health Care (PATCH) Act is stepping up to the plate, demanding a new standard of security for medical IoT devices. This legislation requires that devices not only come with built-in security measures but also maintain those defenses throughout their lifecycle.

The implications are clear: manufacturers must adapt or risk being left behind. Compliance with the PATCH Act means ensuring that every medical IoT device can withstand the threats of today and tomorrow. But the challenge doesn’t end at compliance. The real goal is to enhance patient safety and trust in healthcare technology—a mission that goes beyond mere regulatory adherence.

Vigiles is at the forefront of this mission, providing the tools and expertise needed to meet the PATCH Act’s requirements head-on. Our platform simplifies the process of managing software bills of materials (SBOMs), monitoring vulnerabilities, and deploying necessary updates and patches. With Vigiles, manufacturers can not only achieve compliance but also contribute to a safer, more secure healthcare ecosystem.

In a world where cybersecurity and healthcare are increasingly intertwined, staying informed and prepared is paramount. The PATCH Act is not just a regulatory hurdle; it’s an opportunity to lead in the development of secure, reliable healthcare solutions. Let Vigiles be your guide in this new era of healthcare IoT security.

Learn with Timesys

Why is traditional IT security failing to protect the IoT?

Timesys-India-Team-Goa

The traditional IT security architecture has been through a mammoth, global stress test in recent years thanks to the environment of escalating attacks and huge data breaches. But perhaps the biggest challenge of all to the traditional IT security architecture has been in the IT evolution driven by the Internet of Things (IoT), Cloud Computing, Edge Computing, and related innovations. In this blog, find out how we need to prepare for escalating attacks and huge data breaches.

Vulnerability Management for Embedded

Tools & Techniques to Monitor and Remediate Vulnerabilities in Your SBOM

February 22 @ 12 PM EDT / 9 AM PT

In this monthly live webinar and Q&A session, you’ll learn essential ways to avoid a five-figure mistake along with:

– Why you need to manage your open-source software risks
– How to generate an accurate SBOM (Software Bills of Materials) and why it matters
– Tools and techniques to monitor and remediate vulnerabilities in your SBOM
– And much more!

Learn More

Windows and Linux devices can be hacked by malicious logo images
 

December 2023

Windows and Linux devices can be hacked by malicious logo images

Managing the Growing Tsunami of Vulnerabilities
 

November 2023

Managing the Growing Tsunami of Vulnerabilities

Worst Security Problem Found in cURL” Highlights Need for SBOMs and 1-Click Remote Attack CVE Discovered in Libcue
 

October 2023

Worst Security Problem Found in cURL” Highlights Need for SBOMs and 1-Click Remote Attack CVE Discovered in Libcue

Critical Zero-Day Vulnerability

September 2023

Critical Zero-Day Vulnerability” Recently Disclosed In The Webp Image Library and 7 More Vulnerabilities Exposed