{"id":28312,"date":"2019-08-08T06:56:13","date_gmt":"2019-08-08T06:56:13","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/"},"modified":"2019-08-08T06:56:13","modified_gmt":"2019-08-08T06:56:13","slug":"wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/","title":{"rendered":"WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all"},"content":{"rendered":"<div readability=\"28.673835125448\">\n<h2>Fears of cyber-hijackings? That&#8217;s plane crazy, says Dreamliner maker<\/h2>\n<p> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/08\/07\/santamarta.jpg?x=442&amp;y=293&amp;crop=1\" alt=\"Santamarta\" width=\"442\" height=\"293\" class=\"article_img\"><\/p>\n<p>Talk &#8230; IOActive&#8217;s Ruben Santamarta<\/p>\n<\/div>\n<div id=\"body\" readability=\"135.19457889642\">\n<p><strong class=\"trailer\">Black Hat<\/strong> A Black Hat presentation on how to potentially hijack a 787 \u2013 by exploiting bugs found in internal code left lying around on a public-facing server \u2013 was last night slammed as &#8220;irresponsible and misleading&#8221; by Boeing.<\/p>\n<p>At the hacking conference in Las Vegas on Wednesday, Ruben Santamarta, principal security consultant at pen-testing biz IOActive, told attendees he had found bugs in software used aboard the jetliners.<\/p>\n<p>It is important to note that there are essentially three electronic networks on a 787: the first is home to non-critical stuff like the in-flight entertainment system; the second is used by slightly more important applications reserved for crew and maintenance teams; and the third is used by the vital avionics gear that controls the airplane&#8217;s flight and reads its sensors.<\/p>\n<p>The software Santamarta probed \u2013 a crew information service \u2013 lives on the second network. He suggested it may be possible to exploit holes in, say, the in-flight entertainment system on the first network to access the adjoining second network where one could abuse the flaws he found in the crew information software to then reach into the adjoining third network. Once there, one could tap into the avionics equipment to hijack the 787, in theory.<\/p>\n<p>Boeing, however, insists the software on the second network cannot be exploited as IOActive described, nor can a miscreant direct the avionics from other networks, due to restrictions in place, such as hardware filters that only allow data to flow between networks rather than instructions or commands. <em>El Reg<\/em> quietly hopes the avionics can&#8217;t be taken over by malformed data that triggers vulnerabilities within the flight control systems on the third network.<\/p>\n<h3 class=\"crosshead\"><span>&#8216;Limited&#8217;<\/span><\/h3>\n<p>During his talk, Santamarta acknowledged he had no way of proving he could actually commandeer the flight control systems via the holes he found in the crew-facing software. For one thing, he couldn\u2019t persuade Boeing to let him loose on a real passenger jet.<\/p>\n<p>\u201cWe have confirmed the vulnerabilities, but not that they are exploitable, so we are presenting why we think they are,\u201d he said. \u201cWe have got very limited data, so it\u2019s impossible to say if the mitigation factors Boeing say they have work. We offer them our assistance.\u201d<\/p>\n<p><em>The Register<\/em> spoke to Boeing engineers to get their side of the story. They told us work-in-progress software destined for the 787 was stored on a server belonging to the aircraft manufacturer&#8217;s research and development labs. This box had been, <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/07\/16\/aavgo_hotel_data_breach\/\" rel=\"noopener noreferrer\">like so many databases and other systems recently<\/a>, accidentally left open to the internet, which isn&#8217;t particularly wise. Boeing&#8217;s eggheads were alerted to the exposed machine by someone who wasn\u2019t from IOActive, we&#8217;re told, suggesting God-only-knows how many people found the thing.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/03\/13\/shutterstock_725631049.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Boeing 737-Max 9 on Shutterstock\"><\/p>\n<h2 title=\"Third time's a charm?\">Another rewrite for 737 Max software as cosmic bit-flipping tests glitch out systems \u2013 report<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/08\/02\/737_max_cosmic_bit_flipping_test\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>According to IOActive, in September, Santamarta stumbled upon the software on the server, while it was exposed to the web, using a Google search. He set to work studying the materials, eventually finding a bunch of bugs that could be exploited to achieve arbitrary code execution in the crew information application.<\/p>\n<p>Boeing&#8217;s engineers claimed to us they first knew of IOActive\u2019s investigation into the leaked code when Black Hat&#8217;s organizers published the conference schedule some months ago, revealing that a talk was due to take place on hacking 787 aircraft. According to the techies, IOActive had contacted the crew information software&#8217;s external developer, Honeywell, about its findings, and not Boeing. IOActive categorically denied this to us, and said it spoke to the Dreamliner maker directly about its discoveries.<\/p>\n<p>In any case, a Boeing engineer told us the bugs in the software have been ironed out, and even if they were present, it would not be possible to hijack the avionics network from another network anyway. Once Boeing was aware of the nature of the programming blunders in the Honeywell software found by Santamarta, the manufacturer verified in the lab and then on an actual 787 that it was not possible to seize control of a $150-million-ish jetliner via the holes Santamarta discovered.<\/p>\n<p>And yes, it&#8217;s all very vague because no one wants to spill too many beans about the cyber-security of a passenger jet. And Boeing&#8217;s having none of it.<\/p>\n<p>\u201cIOActive\u2019s scenarios cannot affect any critical or essential airplane system and do not describe a way for remote attackers to access important 787 systems like the avionics system,\u201d a spokesperson for the airliner maker said.<\/p>\n<p>\u201cIOActive reviewed only one part of the 787 network using rudimentary tools, and had no access to the larger system or working environments. IOActive chose to ignore our verified results and limitations in its research, and instead made provocative statements as if they had access to and analyzed the working system. While we appreciate responsible engagement from independent cybersecurity researchers, we\u2019re disappointed in IOActive\u2019s irresponsible and misleading presentation.\u201d \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1842\/-7432\/balancing-consumerization-and-corporate-control?td=wptl1842\">Balancing consumerization and corporate control<\/a><\/p>\n<\/div>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/08\/08\/boeing_787_software_bug_hack\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fears of cyber-hijackings? That&#8217;s plane crazy, says Dreamliner maker Black Hat\u00a0 A Black Hat presentation on how to potentially hijack a 787 \u2013 by exploiting bugs found in internal code left lying around on a public-facing server \u2013 was last night slammed as &#8220;irresponsible and misleading&#8221; by Boeing.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28313,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-28312","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-08T06:56:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"442\" \/>\n\t<meta property=\"og:image:height\" content=\"293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all\",\"datePublished\":\"2019-08-08T06:56:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/\"},\"wordCount\":860,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/\",\"name\":\"WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all.jpg\",\"datePublished\":\"2019-08-08T06:56:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all.jpg\",\"width\":442,\"height\":293},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/","og_locale":"en_US","og_type":"article","og_title":"WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-08T06:56:13+00:00","og_image":[{"width":442,"height":293,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all","datePublished":"2019-08-08T06:56:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/"},"wordCount":860,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/","url":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/","name":"WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all.jpg","datePublished":"2019-08-08T06:56:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all.jpg","width":442,"height":293},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-boeing-on-not-just-customer-databases-lying-around-on-the-web-787-jetliner-code-too-security-bugs-and-all\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28312"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28312\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28313"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}