RunSafe Demonstration: Fortify Your Industrial Control Systems Against Critical Vulnerabilities

This video demonstrates RunSafe Security’s protections against a critical exploit in industrial control systems. See how our solution effectively neutralizes a remote code execution vulnerability in a real-world scenario.

Protect Your Industrial Control Systems from Critical Exploits

In an era where industrial control systems (ICS) are increasingly interconnected, the risk of cyber exploits has never been greater. One such threat is CVE-2020-8597, a 9.8 critical buffer overflow vulnerability in the Point-to-Point Protocol Daemon (PPPD). This flaw, though discovered just four years ago, actually existed for 17 years before it was identified. Despite its age, it continues to jeopardize a wide range of ICS devices and other Linux-based systems, leaving them exposed to remote code execution attacks.

At RunSafe Security, we understand the importance of protecting these vital systems. Our advanced security solutions are designed to prevent such vulnerabilities from being exploited. In this live demonstration, we take a real-world approach by using a BeagleBone Black device as a stand-in for actual industrial control hardware. You’ll see a side-by-side comparison of an unprotected system—vulnerable to a successful exploit—and a system fortified with RunSafe’s protections.

The results are clear: while an unprotected system allows an attacker to gain control and execute malicious code, our protected system effectively thwarts the exploit, preventing the adversary from achieving their objective. Whether it’s creating unauthorized files, modifying sensor data, or altering device calibrations, the potential for damage in unprotected systems is immense. RunSafe’s technology provides a robust defense, ensuring that your control systems remain secure against even the most persistent threats.

Converting A C++ Codebase To Rust

Converting A C++ Codebase To Rust

https://www.youtube.com/watch?v=m5jFze1z7bo   How RunSafe Migrated a 30,000-Line C++ Codebase to Rust Memory-safe languages like Rust are often recommended for new development — but rewriting large, security-critical C++ systems is rarely straightforward. In this...

read more
How RunSafe Protects VxWorks Systems from URGENT/11 Exploits

How RunSafe Protects VxWorks Systems from URGENT/11 Exploits

Stopping URGENT/11 Attacks with RunSafe Protect In this demo, we show how RunSafe Protect defends VxWorks-based embedded systems from URGENT/11 memory safety exploits. You’ll see a vulnerable system challenged by a simulated attack and then observe how RunSafe’s...

read more
RunSafe Security in 2 Minutes: Protecting Critical Software

RunSafe Security in 2 Minutes: Protecting Critical Software

Inside RunSafe: A Quick Look at Our Mission, Platform, and Impact RunSafe Security is dedicated to protecting the world’s most critical software across defense, infrastructure, automotive, and medical systems. In this video, you’ll see how our platform delivers a...

read more