element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      • Japan
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Vietnam
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Embedded and Microcontrollers
  • Technologies
  • More
Embedded and Microcontrollers
Embedded Forum How do you decide which CVEs actually matter in embedded products?
  • Blog
  • Forum
  • Documents
  • Quiz
  • Polls
  • Files
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Embedded and Microcontrollers to participate - click to join for free!
Actions
  • Share
  • More
  • Cancel
Forum Thread Details
  • State Not Answered
  • Replies 4 replies
  • Subscribers 471 subscribers
  • Views 121 views
  • Users 0 members are here
Related

How do you decide which CVEs actually matter in embedded products?

micheal.embedded
micheal.embedded 20 days ago

In embedded products, patching every CVE often isn’t realistic due to certification, long test cycles, limited update windows, or system stability risks.

I’m curious how others handle this in practice. When a CVE affects a component in your system, what factors determine whether it gets patched immediately, deferred, or accepted as risk?

Do you prioritize based on exploitability, attack surface, physical access assumptions, update cost, or something else?

  • Sign in to reply
  • Cancel

Top Replies

  • BigG
    BigG 20 days ago +1
    Great question. Everything needs planning but common sense should still prevail. Wasn't it Warren Buffett who once said "It takes 20 years to build a reputation and five minutes to ruin it. If you think…
  • obones
    0 obones 20 days ago

    I'm trying to assess the risk, with a "score" given to all parameters.
    For instance, if it affects a one off demonstration project that is seldom connected to the network, I'm 99% sure I'll simply ignore the CVE.

    But if it impacts devices located at client's location and the CVE may given unwarranted access to their network, then I'm in favor of issuing an update (OTA, ideally). But then, it's the client's responsibility to apply it, and we've all seen what happens in real life.

    The update cost is rarely taken into account, because the liability clauses in the contract mean that I would bear the cost of any wrongdoing arising from me not acting against a reported issue.

    In the end, if it's a CVE that needs physical access, the default password not changed, and allows to simply change the appearance of the GUI, well, tough luck. I mean, if there is already physical access for the attacker, there are much more interesting things to compromise than defacing a product.

    I've also had a Java CVEs that required remote access to give root access to the attacker. Very much an issue, quite high CVE index (8-9) but I never patched it. Why? Because the device does not have any network interface whatsoever, so the attack cannot happen to begin with. But that's a rare situation, now that everything is (has to be?) connected.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • colporteur
    0 colporteur 20 days ago

    My experience is five years old and may be stale dated.

    Our dev environment conditioned what happened in production. It also made it difficult to know the condition of dev with all the testing.

    Level of exposure was one deciding factor. Yeah sure it is possible but how possible in our environment. Having more than one mind to do the evaluation helped considerably. It help balance the focus of I might get fired if it happens here against we are to good for it to happen here.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • BigG
    0 BigG 20 days ago

    Great question. Everything needs planning but common sense should still prevail.

    Wasn't it Warren Buffett who once said "It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you'll do things differently."

    Hence be proactive. Trying to recover from the scenario where someone finds a critical bug that you've been ignoring, or worse, trying to hide and it's generally tickets.

    The goal isn't to have zero CVEs (which is impossible); it's to try to have zero surprises.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • dougw
    0 dougw 20 days ago

    Almost by definition critical vulnerability means it needs to be addressed. It boils down to assessing whether it is critical or not. For us it means everything critical gets addressed and then we address as many non-critical issues as we have time and budget to tackle. In some cases critical issues have to be addressed with operational procedures as opposed to hardware or software fixes. The actual decision about what is critical is usually assessed using a risk vs cost matrix (if managers are involved). If it is just engineers, they have their own priorities, based on what they are willing to sign off on.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2026 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube