[Control systems] BlackBerry QNX security advisory

Number: AV21-401
Date: 17 August 2021

On 17 August, BlackBerry published a Security Advisory to address vulnerabilities in the following products:

  • BlackBerry QNX Software Development Platform – version 6.5.0SP1 and prior
  • QNX OS for Medical – version 1.1 and prior
  • QNX OS for Safety – version 1.0.1 and prior

Exploitation of these vulnerabilities could lead to arbitrary memory allocation, resulting in unexpected behavior such as a denial of service or remote code execution.

The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates when available.

BlackBerry QNX Advisory (KB 82334)

https://support.blackberry.com/kb/articleDetail?articleNumber=000082334

ICS Advisory (ICSA-AA21-229A)

https://us-cert.cisa.gov/ncas/alerts/aa21-229a

CCCS – Multiple RTOS Security Vulnerabilities (AV21-198)

https://cyber.gc.ca/en/alerts/control-systems-multiple-rtos-security-vulnerabilities

Note to Readers

The Canadian Centre for Cyber Security (Cyber Centre) operates as part of the Communications Security Establishment.  We are Canada’s national authority on cyber security and we lead the government’s response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure, Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.

 

Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: