From Chaos to Resilience: The Collins Aerospace MUSE Cyberattack

30 September, 2025 | Miscelanea

On 19 September 2025 a cyber intrusion against Collins Aerospace’s MUSE passenger-processing platform forced major European airports to revert to pen-and-paper operations. This report explains what happened, why it mattered, and the practical steps airports, airlines and vendors must take to avoid a repeat.

What happened — the operational shock

On 19 September 2025, a sophisticated cyber incident targeted the MUSE family of passenger-processing products from Collins Aerospace (often referred to as cMUSE or vMUSE). The attack disrupted automated check-in kiosks, bag-drop interfaces and gate boarding systems at several high-throughput airports — including London Heathrow, Brussels and Berlin Brandenburg — causing long queues, delays, multiple cancellations and temporary diversions.

Reports from industry intelligence firms and press outlets indicate the outage forced airports into manual fallback mode for hours, demonstrating how a single vendor outage can cascade into systemic operational disruption across carriers and terminals.

What is MUSE — and how it differs from airline PSS platforms

MUSE is a common-use passenger processing system (CUPPS). Its role is to enable shared terminal infrastructure — kiosks, counters and boarding gates — to be used by multiple airlines. That contrasts with a Passenger Service System (PSS) such as Navitaire (part of Amadeus), which focuses on airline commerce: reservations, ticketing, merchandising and revenue management.

In short: MUSE runs the physical passenger flow at the airport; Navitaire runs airline commercial systems. Both are critical, but they live at different layers of the travel stack — and a failure in the CUPPS layer can immediately affect thousands of passengers standing at kiosks and boarding gates.

AspectMUSE / cMUSE / vMUSENavitaire
Primary functionCommon-use passenger processing (check-in, kiosks, bag-drop, boarding gates)Passenger Service System (PSS): reservations, ticketing, merchandising, revenue mgmt
Primary usersAirports and terminal operators; airlines using shared infrastructureAirlines
Deployment modelOn-premises or cloud; CUPPS-compliant integrationsCloud-native, API-driven PSS
Typical interfacesKiosks, printers, biometric readers, gate systems (CUTE/CUPPS standards)Distribution APIs, NDC, EDIFACT, REST for commerce and booking
Operational riskSingle point failure at terminal level — immediate physical passenger impactBusiness continuity, revenue loss and check-in integrity if integrated with airport systems

Anatomy of the attack

Intelligence collected by several security firms points to a supply-chain compromise pattern: an initial intrusion into the vendor environment, followed by propagation to tenant airports. Threat actor attribution remains unsettled — analysts have proposed motives and capabilities ranging from hacktivist disruption to ransomware sabotage and state-sponsored operations — but common techniques line up with the MITRE attack taxonomy: supply-chain access (T1195), phishing (T1566), lateral movement and service stoppage (T1489).

Immediate operational outcomes observed:

  • Extended processing times at check-in and boarding points.
  • Multiple cancellations, diversions and delays at affected airports.
  • Use of pen-and-paper logs to maintain continuity.

Where MUSE and Navitaire sit in the travel stack

MUSE and Navitaire Travel Stack

Practical recommendations (operational & technical)

  1. Regular fallback drills: execute realistic manual check-in and boarding exercises with carriers and ground staff; test timelines and communication plans.
  2. Vendor risk governance: include rigorous cybersecurity SLAs, independent audits and mandatory breach notification windows in contracts with CUPPS/PSS vendors.
  3. Network segmentation: isolate CUPPS infrastructure from general corporate networks and strictly control vendor remote access with phishing-resistant MFA and jump hosts.
  4. Immutable backups: maintain offline, write-once backups for critical configurations and assets to enable restoration after ransomware or destructive attacks.
  5. Active threat hunting: monitor for credential leaks, suspicious admin logins and dark-web chatter tied to airport assets or vendor services.
  6. Staff training: ensure front-line staff know escalation paths and have quick reference procedures for manual operation modes.

Technical table: suggested compatibility & interface checklist

ComponentProtocol / StandardSecurity ControlsNotes
CUPPS / MUSE endpointsCUPPS / CUTE, SOAP/REST for vendor APIsMutual TLS, client certs, strong MFA for admin accessSegmented VLANs; restrict source IPs for vendor management
Kiosks & Gate HWProprietary device protocols; SSH/SNMP for managementDevice hardening, signed firmware, tamper detectionLeast-privilege networks; offline functional fallbacks
PSS (Navitaire)NDC, EDIFACT, REST APIsAPI gateways, WAF, rate limits, per-client credentialsUse service accounts per airline; rotate keys often
Admin & Vendor accessRDP/SSH, VPN, vendor portalsPrivileged access management, just-in-time access, session recordingAvoid permanent standing admin accounts
Telemetry & DetectionSyslog, EDR, SIEM integrationCentralized logging, long retention, anomaly detectionCorrelate vendor telemetry with airport telemetry

How RELIANOID helps secure these applications

Vendor diligence is necessary but not sufficient. RELIANOID’s Application Delivery Controller (ADC) offers a layered protection model that augments vendor hardening: advanced load balancing to absorb and distribute traffic spikes, integrated Web Application Firewall (WAF) rules to block common application-layer attacks, SSL/TLS termination and inspection to detect malicious payloads, and DDoS mitigation to preserve availability during volumetric incidents. Deployed in front of CUPPS endpoints or airline PSS (such as Navitaire), RELIANOID can implement strict access policies, rate limiting, and health-check-driven failover — turning single-vendor outages into manageable incidents rather than systemic shutdowns. Check our technical article about load balancing these applications and RELIANOID use cases in the field.

Conclusion

The September 2025 disruption that moved airports “from MUSE to manual” is a stark reminder that digitization concentrates operational risk. Aviation’s reliance on third-party platforms requires industrywide coordination: routine fallback testing, contractual security guarantees, segmented architecture and resilient infrastructure. With a combination of operational preparedness and technical controls — including ADCs, WAFs, immutable backups and strong access governance — airports and airlines can reduce the odds that a single vendor breach becomes a continent-wide travel crisis.

Related Blogs

Posted by reluser | 24 December 2025
A recent study has shed light on the alarming financial and operational toll of global technology outages during 2025, exposing just how fragile our interconnected digital ecosystem has become. According…
40 LikesComments Off on Global Tech Outages Reveal the Cost of Digital Fragility — and the Urgent Need for Resilience
Posted by reluser | 19 December 2025
The UK is taking an increasingly firm stance on digital security. With cyberattacks rising year after year and billions of connected devices now part of our daily lives, the government…
65 LikesComments Off on Understanding the UK Product Security and Telecommunications Infrastructure (PSTI) Act
Posted by reluser | 16 December 2025
Not long ago, Site Reliability Engineering (SRE) was primarily about keeping web applications fast, available, and scalable. Today, however, the ground is shifting. Artificial Intelligence workloads—particularly inference, where trained models…
70 LikesComments Off on AI Reliability Engineering: The New Era of SRE