Why Memory Safety is Critical for Embedded Devices & Critical Infrastructure

In this video, RunSafe Security CTO Shane Fry explains why memory safety matters, how these vulnerabilities persist, and what organizations can do to reduce their risk.

Memory Safety in Embedded Devices & Critical Infrastructure

The Growing Risk of Memory Safety Vulnerabilities in Embedded Systems

Memory safety vulnerabilities are a major security issue in embedded devices and critical infrastructure, with 70% of industrial control system flaws stemming from memory-related weaknesses. These vulnerabilities don’t just exist—they persist, often lingering in devices for years before they are patched, leaving critical systems exposed to remote exploitation.

In this video, RunSafe Security CTO Shane Fry explores:

  • Why memory safety is the root cause of many cybersecurity threats in embedded systems

  • How vulnerabilities like Urgent 11 and Ripple 20 have remained in devices for over a decade

  • The challenges in patching these security flaws, with some fixes taking years to deploy

  • How organizations can prevent memory safety vulnerabilities from being exploited in the first place

By addressing these vulnerabilities at their root, security teams can significantly reduce the risks associated with unpatched embedded systems. Watch now to learn more about securing critical infrastructure from memory safety threats.

Secure Automotive Software from Source to Runtime

Secure Automotive Software from Source to Runtime

Memory Safety for ECUs, ADAS & More In an era where software defines vehicle safety, the rise in automotive vulnerabilities is alarming. With over 530 CVEs affecting automotive systems in 2024, OEMs and suppliers must rethink how they build and protect software....

read more