[Control systems] Multiple RTOS Security Vulnerabilities – update 1

Number: AV21-198 – Update 1
Date: 30 April 2021
Updated: 17 August 2021

On 29 April 2021 ICS-CERT published an ICS Advisory to highlight vulnerabilities in the following RTOS (real-time operation system) products:

  • Amazon FreeRTOS - version 10.4.1
  • Apache Nuttx OS - version 9.1.0 
  • ARM CMSIS-RTOS2 - versions prior to 2.1.3
  • ARM Mbed OS - version 6.3.0
  • ARM mbed-uallaoc - version 1.3.0
  • Cesanta Software Mongoose OS – version 2.17.0
  • eCosCentric eCosPro RTOS - versions 2.0.1 through 4.5.3
  • Google Cloud IoT Device SDK - version 1.0.2
  • Linux Zephyr RTOS - versions prior to 2.4.0
  • Media Tek LinkIt SDK - versions prior to 4.6.1
  • Micrium OS - versions 5.10.1 and prior
  • NXP MCUXpresso SDK - versions prior to 2.8.2
  • NXP MQX - versions 5.1 and prior
  • Redhat newlib - versions prior to 4.0.0
  • RIOT OS - version 2020.01.1 
  • Samsung Tizen RT RTOS - versions prior 3.0.GBB
  • TencentOS-tiny - version 3.1.0
  • Texas Instruments CC32XX - versions prior to 4.40.00.07
  • Texas Instruments SimpleLink MSP432E4XX
  • Texas Instruments SimpleLink-CC13XX - versions prior to 4.40.00
  • Texas Instruments SimpleLink-CC26XX - versions prior to 4.40.00
  • Texas Instruments SimpleLink-CC32XX - versions prior to 4.10.03
  • Uclibc-NG - versions prior to 1.0.36 
  • Windriver VxWorks – prior to 7.0

UPDATE 1

As of 17 August 2021, ICS-CERT has updated ICS Advisory ICSA-21-119-04 to include the following affected RTOS (real-time operation system) products:

  • Micrium uC/OS: uC/LIB – versions 1.38.xx and 1.39.00
  • BlackBerry QNX Software Development Platform – version 6.5.0SP1 and prior
  • BlackBerry QNX OS for Medical – version 1.1 and prior
  • BlackBerry QNX OS for Safety – version 1.0.1 and prior

END OF UPDATE 1

Exploitation of these vulnerabilities could lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or injected code execution.

The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary updates when available.

ICS Advisory (ICSA-21-119-04)

https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04

UPDATE 1

CCCS - [Control Systems] BlackBerry QNX Security Advisory (AV21-401)

https://cyber.gc.ca/en/alerts/control-systems-blackberry-qnx-security-advisory

END OF UPDATE 1

Note to Readers

The Canadian Centre for Cyber Security (Cyber Centre) operates as part of the Communications Security Establishment.  We are Canada’s national authority on cyber security and we lead the government’s response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure, Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.

Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: