Defense giant BAE Systems has unveiled Viper Memory Loader Verifier II (MLV II), a system whose role is to protect F-16 fighter aircraft against potential cyberattacks.
MLV II is the second version of a maintenance capability that should “reduce vulnerability to cyberattacks for F-16 aircraft”.
The system is used to load and verify software onto the fighter jet, ensuring that malicious software or files cannot get on the aircraft.
The system supports mission data files, flight and fault data, and third-party software. It supports over 100 F-16 onboard systems, including flight- and mission-critical components such as radar, engine control, navigation, communications, crash data recorders, and electronic warfare, mission and flight control.
“This new version of the product will include cyber-hardened aircraft mission capabilities, with an open system architecture that reduces lifecycle costs,” said Carl Huncharek, F-16 product line director for BAE Systems.
The company says MLV II, which is made in Fort Worth, Texas, is fully compatible with the F-16 fleet and it will be used on all new deployments, while existing equipment will also continue to be supported.
BAE says the cybersecurity system has been tested by the US and more than two dozen of its allies.
Related: CISO Conversations: Honda Aircraft, Bombardier CISOs Discuss Getting Started in Security
Related: US Air Force Adopts Zero Trust to Secure Flightline Operations
Related: Passengers Exposed to Hacking via Vulnerabilities in Airplane Wi-Fi Devices
Related: Watchdog Urges More Action to Protect Planes From Hackers

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
Latest News
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Comcast Wants a Slice of the Enterprise Cybersecurity Business
