Wednesday, May 14, 2025
HomeCVE/vulnerabilityA Critical Software Bug Turns an Airplane to the Wrong Way -...

A Critical Software Bug Turns an Airplane to the Wrong Way – Turned Right Instead of Left

Published on

SIEM as a Service

Follow Us on Google News

Recently, security researchers have discovered a very distinct software bug that is marked as a very critical software bug, as it turns an airplane in the wrong way. 

Nav Canada firstly identified this bug in 2017 on a Bombardier CRJ-200, which makes the aircraft to switch to the wrong way, in short, this bug turns the airplane to right instead of left if pilots regulate the pre-set height limit.

Soon after the incident, it was reported to the appropriate authority, and the other reason for this software bug is that the pilots used the FMS’s temperature compensation function in a remarkably cold climate.

- Advertisement - Google News

What’s the problem?

As we said that due to the use of FM’S temperature compensation function by the pilots in a very cold climate, a critical software bug took place as it turns an airplane in the wrong way, or we can say that instead of left they turn towards the right. 

Well, the pilots also said that the airplane just turns to the wrong way as it was heeding the published missed approach, and they also said that this type of misconception generally does not occur.

But, according to one of the professional aviators, selecting the altitude correctly or utilizing temperature compensation does not really alter the flight segment. Thus we can say that just because of the design error, the software imagines the flight division has shifted.  

Moreover, disabling the FMS automatic features are done by the aircraft’s configuration strapping unit (CSU) and reviewing the airplane flight manual (AFM) reservations segment. 

However, Rockwell Collins opposed the FAA and the prescribed steps that are to be perceived regarding it; thus, in Europe this week, it was published that a necessary airworthiness directive organization operators of CRJ-200 aircraft to impair the automatic temperature compensation till mid-June.

After all this discussion, the FAA was not satisfied by this decision, thus disagreed in disabling the FMS feature as it is necessary to address the unsafe condition. And both companies disagreed with the banned of the FMS automatic feature. 

They declared that a software fix would be more accessible to achieve rather than forbidding the use of the electronic calculator.

Well, all have this much idea that all the bugs that took place in the flight are very uncommon. And both Airbus and Boeing have discovered that most of the airline bugs serve to be unexpected memory overflows over the year. 

Moreover, there is a design that is owned by Bombardier, the Airbus A220, that has gone through the same software-induced issues with its engines last year. In contrast, the Boeing 737 was found to have a unique bug that has blanked all cockpit, and it also shows if pilots attempted to land on one of seven distinct runways in the whole world.

So, what do you think about this? Share all your views and thoughts in the comment section below.

Also Read: Radio Tech Used to Hack Everything From Airplanes to Defibrillators

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

PoC Code Published for Linux nftables Security Vulnerability

Security researchers have published proof-of-concept (PoC) exploit code for CVE-2024-26809, a high-severity double-free vulnerability in...

Cisco IOS XE Vulnerability Allows Attackers to Gain Elevated Privileges

Cisco has issued an urgent security advisory (ID: cisco-sa-iosxe-privesc-su7scvdp) following the discovery of multiple...

Cisco IOS, XE, and XR Vulnerability Allows Remote Device Reboots

 Cisco has issued an urgent security advisory (cisco-sa-twamp-kV4FHugn) warning of a critical vulnerability in...