Wind River® strives to deliver secure and reliable products. But with ever-increasing numbers of interconnected intelligent devices, software vulnerabilities have become more widespread than ever.
These vulnerabilities may occur in Wind River–developed products or in execution environments in which Wind River products operate. Wind River is committed to active threat monitoring, rapid assessment and threat prioritization, proactive customer notification, and timely remediation.
See the links below for some of the latest Common Vulnerability and Exposure (CVE) responses, or search our CVE database for the full list.
- Wind River Security Vulnerability Notice: CVE-2024-23897 and CVE-2024-23898
- Wind River Security Alert: Open SSL 3.0.X
- Wind River Security Alert: Apache Log 4j Vulnerability, CVE-2021-44228, Log4Shell
- Wind River Security Vulnerability Notice: TCP/IP Network Stack (IPnet, Urgent/11)
- Wind River Security Vulnerability Notice: Microarchitectural Data Sampling (MDS)
- Wind River Security Vulnerability Notice: CVE-2018-8897
- Wind River Security Vulnerability Notice: Meltdown and Spectre
- Wind River Security Vulnerability Notice: KRACK
- Wind River Security Vulnerability Notice: Stack Clash
- Wind River Security Vulnerability Notice: Dirty COW