System-Level Security

Zero Attack Paths (ZAP™) solution protects digital infrastructures with Secure Vault™ and Secure AI™

$126billion

SECURITY SPENDING
WORLDWIDE IN 2019

$6trillion

LOSSES FROM CYBERCRIME
PER YEAR BY 2021

Red Herring Top 100 Winner Logo

Axiado Corporation chosen as a 2020
Red Herring Top 100 North America Winner


  • CVE-2018 -19440

    64-bit ARM guest kernels allow local users to read system memory or cause a denial of service.

  • CVE-2020-10713

    Flaw in grub2, prior to version 2.06. Attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process.

  • CVE-2020-14308

    Grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size.

  • CVE-2020-14309

    Issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size.

  • CVE-2020-14310

    Issue on grub2 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value.

  • CVE-2020-14310

    Issue with grub2 before version 2.06 while handling symlink on ext filesystems.

  • CVE-2020-14310

    GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed.

  • CVE-2020-14310

    GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed.

  • CVE-2020-10713

    Flaw in grub2, prior to version 2.06. Attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process.

  • CVE-2020-6973

    Digi International ConnectPort LTS 32 MEI, Firmware Version 1.4.3, bios Version 1.2.

  • CVE-2019-6321

    HP Workstation BIOS (UEFI Firmware) runtime BIOS code could be tampered with if the TPM is disabled.

  • CVE-2019-6171

    BIOS versions of ThinkPad systems allows admin to update the Embedded Controller with unsigned firmware.

  • CVE-2020-0689

    A security feature bypass vulnerability exists in secure boot, aka 'Microsoft Secure Boot Security Feature Bypass Vulnerability'.

  • CVE-2019-9436

    Android kernel in the bootloader possible secure boot bypass. Could lead to local escalation of privilege with System execution privileges needed.

  • CVE-2020-10724

    Vulnerability in DPDK versions 18.11 and above vhost-crypto library code missing validations for user-supplied values.

  • CVE-2019-9399

    The Print Service is susceptible to man in the middle attacks due to improperly used crypto. May lead to remote information disclosure.

  • CVE-2020-5348

    Dell Latitude 7202 Rugged Tablet BIOS versions prior to A28 contain a UAF vulnerability in EFI_BOOT_SERVICES in system management mode



TECHNOLOGY

Hardware-Enhanced Security with AI

There are 140,000 security holes in current systems, and the cybersecurity industry only addresses those in software. Axiado security protects systems on all levels from hardware and software vulnerabilities with its full-stack Zero Attack Paths (ZAP™) solution, Secure Vault™ architecture, and Secure AI™ per-system technology.

Original Image
PRODUCTS

Securing Infrastructures

Axiado's products are designed for full-system security from the ground up. They protect enterprises, data centers, electric grids, bridges, industrial IoT, smart cities, and other high value infrastructure assets from attacks.


EDGE IQ™ Processor

The Edge IQ™ Processor upgrades vulnerable edge computing hardware systems with a tamper-proof IIoT controller. This fully secured, smart communication, and IIoT single-board computer-on-a-chip brings high performance and security to the edge by running applications and analytics locally. It features the Secure Vault™ boot process, a trusted execution environment, and a crypto accelerator for root of trust.



WATCHGUARD™ COPROCESSOR

The secure, Zero-Trust Watchguard™ coprocessor upgrades security for servers, PCs, and mobile devices. It features the Secure Vault™ architecture, and Secure AI™, the world’s first per-system AI engine in hardware. Secure remote management ensures no unauthorized access to the host processor. In addition, system performance and security are optimized through full visibility of hardware and software components.



Request a Demo

Whether you are looking to reinvent edge computing or just secure what you already have in place, let us demonstrate how our innovative technologies will integrate into your system and secure your infrastructure.




Featured Posts