
AdaCore Cybersecurity Center
Security Advisories
-
AWS does not handle timeout during SSL handshake
SEC.AWS-0095-v1.pdf — 2025-09-03 -
Insecure defaults in AWS.Client when linked with GnuTLS
SEC.AWS-0056-v1.pdf — 2025-02-24 -
Ada Web Server does not use Crypto Secure Pseudo Random Number Generator
SEC.AWS-0040-v2.pdf — 2024-09-23 -
Certificate hostname check is missing when using secure connection
SEC.AWS-0031-v2.pdf — 2024-08-13 -
Potential memory corruption issue with GNAT.Regexp
SEC.UA16-001-v1.pdf — 2023-05-01 -
Alignment on a tagged type may cause invalid deallocation
SEC.UB10-053-v1.pdf — 2023-05-01 -
Memory corruption in GNAT.Sockets.Get_Host_By_Name
SEC.UB16-046-v1.pdf — 2023-05-01 -
Bidirectional Unicode characters in Ada source code
SEC.UB03-050-v1.pdf — 2022-02-09
IT Security Alerts and Notifications
-
CVE-2024-3094
2024-04-03 -
DNSSEC and DMARC Compliance at AdaCore
2024-01-24 -
Potential ServiceNow Vulnerability Investigation (KB1553688)
2023-10-23
Trust and Transparency
-
AdaCore Coordinated Disclosure Policy
2025-09-03 -
AdaCore Security Policy
2024-03-11 -
Third Party Services Storing Customer Confidential Information
2024-03-05
FAQs
AdaCore treats all customer data as confidential and stores it on AdaCore-controlled servers, cloud systems (AWS and Google Cloud), and trusted third-party services like Salesforce and ServiceNow. Encryption at rest is enforced on all servers and user devices. Additionally, access to this data is managed through an RBAC (Role-based Access Control) system with a Principle of Least Privilege approach, ensuring users only have the necessary permissions.
AdaCore conducts regular security awareness training for all employees, including topics like phishing awareness and password management. There are dedicated incident response teams, CSIRT and PSIRT (Computer and Product Security Incident Response Teams), to handle security incidents and those related to the Software Supply Chain. AdaCore also employs automated detection systems, such as intrusion detection and Data Loss Prevention, and encourages manual reporting of security events to security staff.
AdaCore’s build system ensures full traceability from source code to the final product, allowing for the generation of SBOMs and CVE scanning. Builds are performed on ephemeral machines with restricted access. All code changes undergo review, and a full rebuild and testing process is conducted daily. Additionally, both automated and manual tests are performed before each release, and any issues are documented.
AdaCore requires code reviews for all changes or additions of external dependencies to their products' source code or build/test systems. Each third-party package is initially checked with VirusTotal internal submission, and all binaries pushed to the artifact store are scanned with Windows Defender and ClamAV. This ensures thorough security checks are conducted on any third-party software used.
AdaCore utilizes CIS Benchmarks to generate secure OS images for workstations and reviews controls annually. Password managers are required for employees, and permissions are audited regularly. Additionally, workstations are protected by anti-virus software like Windows Defender (for Windows) and Sandbox/Gatekeeper (for macOS), and OS firewalls are activated by default.


