Device Provisioning and
Resource Management
for Service Providers

View our Solutions
Notice regarding Bash vulnerability CVE-2014-6271
None of Incognito's services are vulnerable to this exploit. Read more

There are two conditions that need to be present for this to be an issue: Being able to set environment variables, and passing those environment variables into a program that will fork a shell script that uses those environment variables.

None of our services (Broadband Command Center, Address Commander etc.) fork a shell to run a shell script, so the conditions to expose this vulnerability are not present within our products. In other words, our services are not vulnerable.

However, we do strongly recommend that customers contact their OS vendor to obtain an updated version of Bash that fixes this vulnerability, as while our services cannot be used to exploit this vulnerability, there may be other services on the operating system that can.


Cable Service Provider

From quickly launching new services, to provisioning, activating, and monitoring those services, we have the solution your network needs.

Wireless Service Provider

Free up and efficiently manage the IP resources stranded to your GGSN with centralized DHCP and IP address management solutions.

Wireline Service Provider

Bogged down by inefficient device provisioning and IP resource constraints? Our DHCP and IP address management solutions can help.

IPv6 Readiness Report

IPv6 Readiness in the Service Provider Industry Report

Learn about the cable, wireless, and wireline industry’s level of preparedness for adopting this new protocol.


Incognito Community Exchange

The conference for exchanging insight on the latest trends and best practices in the device and service-provisioning field. Returning April 7-9, 2015 in Las Vegas.

Stephane Bourque President & CEO

Stephane Bourque, President and CEO of Incognito Software has been named a finalist for the Ernst & Young Entrepreneur Of The Year® 2014 Award for British Columbia.