Incident: Cybersecurity Flaw in BlackBerry QNX RTOS Puts Critical Systems at Risk

Published Date: 2021-08-17

Postmortem Analysis
Timeline 1. The software failure incident involving a cybersecurity flaw in BlackBerry's QNX Real Time Operating System (QNX RTOS) happened when the article was published on August 17, 2021 [118254].
System 1. QNX Real Time Operating System (QNX RTOS) versions dating from 2012 and earlier [118254]
Responsible Organization 1. The cybersecurity flaw in the software designed by BlackBerry Ltd (BB.TO) was responsible for causing the software failure incident [118254].
Impacted Organization 1. Automakers including Volkswagen, BMW, and Ford Motor were impacted by the software failure incident [118254].
Software Causes 1. The software failure incident was caused by a cybersecurity flaw in the QNX Real Time Operating System (QNX RTOS) designed by BlackBerry Ltd [118254].
Non-software Causes 1. The vulnerability in the software designed by BlackBerry Ltd was caused by a cybersecurity flaw, allowing an attacker to execute arbitrary code or flood a server with traffic [Article 118254].
Impacts 1. The software failure incident in the BlackBerry QNX Real Time Operating System (QNX RTOS) exposed cars and medical equipment to potential risks and could allow attackers to execute arbitrary code or disrupt servers [118254]. 2. The vulnerability in the software could lead to a malicious actor gaining control of highly sensitive systems, increasing the risk to critical functions in the nation [118254]. 3. The U.S. Food and Drug Administration stated that they were not aware of any adverse events resulting from the software vulnerability, but medical equipment manufacturers were assessing the potential impact on their systems [118254].
Preventions 1. Regular security audits and vulnerability assessments of the software could have potentially identified the flaw in the QNX Real Time Operating System (QNX RTOS) before it could be exploited [118254]. 2. Implementing a robust software development lifecycle process that includes thorough testing, code reviews, and security checks could have helped in detecting and addressing the vulnerability in earlier versions of the software [118254]. 3. Timely and transparent communication by BlackBerry Ltd regarding the vulnerability could have enabled customers to take proactive measures to protect their systems and mitigate potential risks [118254].
Fixes 1. Software patches made available by BlackBerry to resolve the vulnerability in the QNX Real Time Operating System (QNX RTOS) could fix the software failure incident [118254].
References 1. U.S. Cybersecurity and Infrastructure Security Agency (CISA) [118254] 2. U.S. Food and Drug Administration [118254] 3. BlackBerry Ltd [118254] 4. Automakers including Volkswagen, BMW, and Ford Motor [118254] 5. Politico [118254]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the cybersecurity flaw in the software designed by BlackBerry Ltd has happened again within the same organization. The article mentions that BlackBerry initially denied that the vulnerability impacted its products and later resisted making a public announcement about it, indicating a lack of transparency or acknowledgment of the issue within the organization [118254]. (b) The software failure incident has also impacted multiple organizations as the vulnerability in BlackBerry's QNX Real Time Operating System (QNX RTOS) is used by automakers including Volkswagen, BMW, and Ford Motor in critical functions like the Advanced Driver Assistance System [118254]. This indicates that the same software flaw has affected various organizations utilizing the software in their products and services.
Phase (Design/Operation) design (a) The software failure incident in the article is related to the design phase. The cybersecurity flaw in the software designed by BlackBerry Ltd's QNX Real Time Operating System (QNX RTOS) was identified as a vulnerability that could allow an attacker to execute arbitrary code or flood a server with traffic until it crashes or gets paralyzed. This flaw was present in versions dating from 2012 and earlier, indicating a design issue in the software [118254]. (b) The article does not provide information about the software failure incident being related to the operation phase.
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident related to the cybersecurity flaw in BlackBerry's QNX Real Time Operating System (QNX RTOS) was due to a vulnerability within the system itself. The flaw could allow an attacker to execute arbitrary code or flood a server with traffic until it crashes, indicating an internal issue within the software [118254]. (b) outside_system: The software failure incident also involved contributing factors from outside the system. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) highlighted that the compromise of the software could result in a malicious actor gaining control of highly sensitive systems, indicating external threats to the system [118254].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case was due to a cybersecurity flaw in the software designed by BlackBerry Ltd, specifically in its QNX Real Time Operating System (QNX RTOS). The vulnerability could allow an attacker to execute arbitrary code or flood a server with traffic until it crashes or gets paralyzed. This flaw was a non-human action that introduced a contributing factor without human participation [118254]. (b) Human actions were involved in the response to the software failure incident. BlackBerry initially denied that the vulnerability impacted its products and resisted making a public announcement. This resistance to disclosure was a human action that affected the handling of the situation [118254].
Dimension (Hardware/Software) software (a) The software failure incident reported in Article 118254 is related to a cybersecurity flaw in the software designed by BlackBerry Ltd, specifically in their QNX Real Time Operating System (QNX RTOS). This flaw could potentially put at risk cars and medical equipment that use the software, exposing highly sensitive systems to attackers. The vulnerability in the software could allow an attacker to execute arbitrary code or flood a server with traffic until it crashes or gets paralyzed. The issue is related to a flaw in the software itself, rather than originating from hardware [118254].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in this case is considered malicious. The cybersecurity flaw in the software designed by BlackBerry Ltd was identified as a vulnerability that could allow an attacker to execute arbitrary code or disrupt the system. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) highlighted that the compromise of the software could lead to a malicious actor gaining control of highly sensitive systems, posing a risk to critical functions [118254]. Additionally, the vulnerability was initially denied by BlackBerry and the company resisted making a public announcement about it, indicating a level of secrecy or reluctance to address the issue promptly [118254].
Intent (Poor/Accidental Decisions) (a) The software failure incident related to the cybersecurity flaw in BlackBerry's QNX Real Time Operating System (QNX RTOS) was not due to poor decisions but rather a vulnerability in the software itself dating back to versions from 2012 and earlier. The incident was not a result of poor decisions but rather a flaw in the software that could allow attackers to execute arbitrary code or disrupt servers [118254].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident reported in the article is related to a cybersecurity flaw in a software designed by BlackBerry Ltd, specifically in its QNX Real Time Operating System (QNX RTOS). The vulnerability in the software could allow an attacker to execute arbitrary code or flood a server with traffic until it crashes or gets paralyzed. This indicates a failure due to contributing factors introduced due to a lack of professional competence by humans or the development organization [118254]. (b) The article does not provide information indicating that the software failure incident was accidental.
Duration temporary (a) The software failure incident described in the article is more likely to be temporary rather than permanent. This is indicated by the fact that the vulnerability in the QNX Real Time Operating System (QNX RTOS) impacts versions dating from 2012 and earlier, and not current or recent versions. Additionally, the article mentions that BlackBerry has made software patches available to resolve the matter, indicating that the issue can be fixed and is not a permanent flaw [118254].
Behaviour crash, omission, other (a) crash: The software failure incident mentioned in the article is related to a cybersecurity flaw in BlackBerry's QNX Real Time Operating System (QNX RTOS) that could potentially allow an attacker to flood a server with traffic until it crashes or gets paralyzed [118254]. (b) omission: The vulnerability in the QNX RTOS could allow an attacker to execute arbitrary code, which indicates a potential omission of performing its intended functions securely [118254]. (c) timing: There is no specific mention of timing-related failures in the article. (d) value: The software failure incident does not involve the system performing its intended functions incorrectly. (e) byzantine: The article does not describe the software failure incident as involving inconsistent responses or interactions. (f) other: The behavior of the software failure incident is primarily related to a cybersecurity flaw that could potentially compromise the security of systems using the QNX RTOS, leading to concerns about the control of highly sensitive systems and the risk to critical functions [118254].

IoT System Layer

Layer Option Rationale
Perception sensor, embedded_software (a) The failure was related to the perception layer of the cyber physical system that failed due to contributing factors introduced by sensor error. The software flaw in BlackBerry's QNX Real Time Operating System (QNX RTOS) could put at risk cars and medical equipment that use it. The vulnerability could allow an attacker to execute arbitrary code or flood a server with traffic until it crashes or gets paralyzed, impacting critical functions including the Advanced Driver Assistance System [Article 118254].
Communication unknown The software failure incident reported in Article 118254 was related to a cybersecurity flaw in the QNX Real Time Operating System (QNX RTOS) designed by BlackBerry Ltd. This flaw could potentially put at risk cars and medical equipment that use the software, exposing highly sensitive systems to attackers. The vulnerability in the QNX RTOS could allow an attacker to execute arbitrary code or flood a server with traffic until it crashes or gets paralyzed. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) highlighted that the compromise of the software could result in a malicious actor gaining control of highly sensitive systems, increasing the risk to critical functions [118254]. Based on the information provided in the article, the failure does not seem to be directly related to the communication layer of the cyber-physical system (link_level) but rather to the software vulnerability itself, which could be exploited to compromise the system's security.
Application FALSE The software failure incident related to the cybersecurity flaw in BlackBerry's QNX Real Time Operating System (QNX RTOS) does not seem to be directly related to the application layer of the cyber physical system. The vulnerability in the QNX RTOS was described as a cybersecurity flaw that could allow an attacker to execute arbitrary code or flood a server with traffic, indicating a lower-level vulnerability rather than a specific application layer issue [118254].

Other Details

Category Option Rationale
Consequence property, non-human, theoretical_consequence (f) non-human: Non-human entities were impacted due to the software failure [118254]. The software failure incident involving a cybersecurity flaw in BlackBerry's QNX Real Time Operating System (QNX RTOS) could put at risk cars and medical equipment that use it. The vulnerability in the software could allow an attacker to execute arbitrary code or flood a server with traffic, potentially affecting critical functions in vehicles and medical devices.
Domain transportation (a) The software failure incident reported in the article is related to the transportation industry. The vulnerable software, QNX Real Time Operating System (QNX RTOS), is used by automakers such as Volkswagen, BMW, and Ford Motor in critical functions including the Advanced Driver Assistance System [118254].

Sources

Back to List