element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      • Japan
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Vietnam
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Embedded and Microcontrollers
  • Technologies
  • More
Embedded and Microcontrollers
Embedded Forum How do you decide which CVEs actually matter in embedded products?
  • Blog
  • Forum
  • Documents
  • Quiz
  • Polls
  • Files
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Embedded and Microcontrollers to participate - click to join for free!
Actions
  • Share
  • More
  • Cancel
Forum Thread Details
  • State Not Answered
  • Replies 4 replies
  • Subscribers 474 subscribers
  • Views 199 views
  • Users 0 members are here
Related

How do you decide which CVEs actually matter in embedded products?

micheal.embedded
micheal.embedded 1 month ago

In embedded products, patching every CVE often isn’t realistic due to certification, long test cycles, limited update windows, or system stability risks.

I’m curious how others handle this in practice. When a CVE affects a component in your system, what factors determine whether it gets patched immediately, deferred, or accepted as risk?

Do you prioritize based on exploitability, attack surface, physical access assumptions, update cost, or something else?

  • Sign in to reply
  • Cancel

Top Replies

  • BigG
    BigG 1 month ago +1
    Great question. Everything needs planning but common sense should still prevail. Wasn't it Warren Buffett who once said "It takes 20 years to build a reputation and five minutes to ruin it. If you think…
Parents
  • obones
    0 obones 1 month ago

    I'm trying to assess the risk, with a "score" given to all parameters.
    For instance, if it affects a one off demonstration project that is seldom connected to the network, I'm 99% sure I'll simply ignore the CVE.

    But if it impacts devices located at client's location and the CVE may given unwarranted access to their network, then I'm in favor of issuing an update (OTA, ideally). But then, it's the client's responsibility to apply it, and we've all seen what happens in real life.

    The update cost is rarely taken into account, because the liability clauses in the contract mean that I would bear the cost of any wrongdoing arising from me not acting against a reported issue.

    In the end, if it's a CVE that needs physical access, the default password not changed, and allows to simply change the appearance of the GUI, well, tough luck. I mean, if there is already physical access for the attacker, there are much more interesting things to compromise than defacing a product.

    I've also had a Java CVEs that required remote access to give root access to the attacker. Very much an issue, quite high CVE index (8-9) but I never patched it. Why? Because the device does not have any network interface whatsoever, so the attack cannot happen to begin with. But that's a rare situation, now that everything is (has to be?) connected.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
Reply
  • obones
    0 obones 1 month ago

    I'm trying to assess the risk, with a "score" given to all parameters.
    For instance, if it affects a one off demonstration project that is seldom connected to the network, I'm 99% sure I'll simply ignore the CVE.

    But if it impacts devices located at client's location and the CVE may given unwarranted access to their network, then I'm in favor of issuing an update (OTA, ideally). But then, it's the client's responsibility to apply it, and we've all seen what happens in real life.

    The update cost is rarely taken into account, because the liability clauses in the contract mean that I would bear the cost of any wrongdoing arising from me not acting against a reported issue.

    In the end, if it's a CVE that needs physical access, the default password not changed, and allows to simply change the appearance of the GUI, well, tough luck. I mean, if there is already physical access for the attacker, there are much more interesting things to compromise than defacing a product.

    I've also had a Java CVEs that required remote access to give root access to the attacker. Very much an issue, quite high CVE index (8-9) but I never patched it. Why? Because the device does not have any network interface whatsoever, so the attack cannot happen to begin with. But that's a rare situation, now that everything is (has to be?) connected.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
Children
No Data
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2026 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube