Real Time Operating System Real Time Operating System

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Real Time Operating System.

By the Year

In 2026 there have been 0 vulnerabilities in Real Time Operating System. Real Time Operating System did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 1 0.00

It may take a day or so for new Real Time Operating System vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Real Time Operating System Security Vulnerabilities

TIs BLE stack caches and reuses the LTKs property for a bonded mobile
CVE-2020-16630 - September 20, 2021

TIs BLE stack caches and reuses the LTKs property for a bonded mobile. A LTK can be an unauthenticated-and-no-MITM-protection key created by Just Works or an authenticated-and-MITM-protection key created by Passkey Entry, Numeric Comparison or OOB. Assume that a victim mobile uses secure pairing to pair with a victim BLE device based on TI chips and generate an authenticated-and-MITM-protection LTK. If a fake mobile with the victim mobiles MAC address uses Just Works and pairs with the victim device, the generated LTK still has the property of authenticated-and-MITM-protection. Therefore, the fake mobile can access attributes with the authenticated read/write permission.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Real Time Operating System or by Ti? Click the Watch button to subscribe.

Ti
Vendor

subscribe