首页> 外文会议>Safety-Critical Systems Symposium >IPnet Vulnerabilities: A Case Study
【24h】

IPnet Vulnerabilities: A Case Study

机译:IPNet漏洞:案例研究

获取原文

摘要

In 2019, Wind River was notified by security researchers of identified vulnerabilities in the IPnet networking stack which is used in various real-time operating systems (RTOS), including specific versions of VxWorks, the world's most widely used RTOS. These vulnerabilities, dubbed "Urgent/11", could potentially impact certain configurations of connected devices which used IP net-working, although at that time (nor at any time since) was there any indication of the discovered vulnerabilities having ever been exploited in the wild. In this paper, we will present Wind River's security response, including the timeline of events, analysis of vulnerabilities and issuance of patches to help device makers mitigate potential risks to deployed systems, and lessons learnt. The importance of a coordinated Responsible Disclosure will also be presented, along with the communication approach Wind River used for internal communications and externally with its customers.
机译:2019年,Wind River通过IPNet网络堆栈中所确定的漏洞的安全研究人员通知,该漏洞在各种实时操作系统(RTOS)中使用,包括VxWorks的特定版本,世界上使用最广泛的RTOS。 这些漏洞被称为“紧急/ 11”,可能会影响使用IP网络工作的连接设备的某些配置,尽管当时(自从以来的任何时间)有没有被剥削的发现漏洞的迹象表明 荒野。 在本文中,我们将展示Wind River的安全响应,包括事件的时间表,漏洞分析和发布补丁,以帮助设备制造商降低部署系统的潜在风险,并了解的经验教训。 还将提出协调负责披露的重要性,以及用于内部通信和外部客户的通信方法Wind River。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号