6 critical vulnerabilities in IoT firmware — fully patched, NIS2-ready, downtime −45%.
Baseline
An automation vendor used third‑party IoT control modules. After a security incident at another customer of the same manufacturer, it was clear the proprietary firmware—no longer receiving updates—had to be audited. 200+ modules in the field. Enterprise customers required a NIS2 evidence package.
Vulnerabilities found
Solution: a fully improved firmware rewrite
Credentials
Removed hardcoded passwords → X.509 certificate authentication + BLE provisioning
Encryption
RC4 → AES‑256‑GCM for all connections. MQTT over TLS 1.3.
HTTP parser
Rewritten from scratch. Length validation, bounds checking, hardened C++ with static analysis.
Secure boot
RSA‑2048 firmware signing. Only signed OTA images are accepted. Rollback protection.
Debug services
Fully disabled in production mode. Hardware jumper instead of a software flag.
Audit logging
Full log: connections, config changes, alarms with timestamp.
Rollout: 200+ modules without downtime
OTA update in waves (20% → 50% → 100%) with continuous monitoring. Firmware update time per module: < 90 seconds. All modules patched within 3 weeks.
IoT devices in the field — how secure is your firmware?
Firmware security audit: we analyze, find vulnerabilities, and deliver hardened firmware.
Request a free call