The Year 2038 Problem

Are You Compliant?

DAYS
HOURS
MINUTES
SECONDS

Y2k38 – The Year 2038 Problem

The Year 2038 Problem — also known as Y2K38 bug — is the next major global time issue after Y2K. Ensuring Y2K38 compliance is becoming increasingly important as billions of devices and systems around the world rely on internal timekeeping that will reach its limit in January 2038.

Many people still remember the Year 2000 Problem, better known as Y2K or the Millennium Bug. At the time, massive global efforts prevented widespread failures. But the challenge ahead is broader: the Year 2038 Problem affects not only traditional computers, but also the billions of embedded devices already integrated into modern life — from cars, routers and smartphones to industrial machinery, medical equipment and critical infrastructure.

As 2038 approaches, organisations need to understand what the Year 2038 Problem means for their systems and how to prepare. This website provides a clear introduction to the topic, raises awareness, and offers guidance and resources to help achieve Y2K38 compliance long before the deadline arrives.

What is the Year 2038 Problem?

The Y2K38 Bug is the name for a time-related error that will occur in January 2038. The term combines Y2K38 — a numeronym for the year 2038 — and the word bug, because it is essentially a software design flaw.

To understand why it exists, it helps to look at how many systems measure time. Instead of using dates and calendars, computers often rely on a simple counter that started ticking on 1 January 1970. This starting point is known as the Unix epoch. Every second since then has been added to this counter — a very compact and efficient method used in countless operating systems, devices and applications.

In the early days of computing, this counter was stored in a relatively small number format (32-bit time_t). For many systems, this format can only represent a limited range of values. When the maximum is reached, the counter “overflows” and jumps back to the beginning, much like an odometer rolling over.

This is exactly what will happen on 19 January 2038. One second after reaching its limit, the internal time counter will reset to a value that corresponds to the December 13, 1901. The result is a fundamental time error deep inside the system: dates appear to move backwards, comparisons no longer make sense, and software loses its chronological reference point.

In simple terms: The Y2K38 Bug is a counter running out of space.
Just like the Y2K issue in the year 2000, it is a problem of how time was represented in systems — only this time, the flaw lies even deeper in the foundations of modern computing.

Why Y2k38 Compliance Matters

The Year 2038 Problem may sound far away, but its foundations are already built into billions of systems we use every day. Many devices and applications created years ago — and even those produced today — will still be running when 2038 arrives. If they rely on older time formats, they will eventually reach their limit and stop handling dates correctly.

Unlike the Y2K challenge, which mainly affected classic IT systems, the Y2K38 issue reaches much deeper. Embedded systems in cars, household appliances, medical equipment, industrial machines, telecom networks and countless connected devices often run quietly in the background for many years. Once installed, many of them cannot be updated at all.

Although the Year 2038 Problem is often dismissed as a “theoretical bug,” its consequences can be very real. Depending on the system, the effects range from harmless display errors to serious operational failures:

  • wrong timestamps in databases, log files or backups can make analysis and troubleshooting impossible
  • certificates and licences may suddenly appear expired and block services
  • software may crash or freeze when time calculations no longer make sense
  • devices that rely on internal clocks — from navigation units to cash registers to medical equipment — can malfunction

The greatest concern lies with the enormous number of embedded devices in use worldwide. Many of them run unnoticed in the background: IoT sensors, routers, smart home devices, industrial controls or vehicle electronics. These systems often have long lifespans and no update mechanism. This is where the real time bomb is ticking — and where unexpected failures could occur once 2038 arrives.

Early awareness and preparation are therefore essential. Understanding the Year 2038 Problem today helps organisations:

  • identify systems that may stop working in 2038
  • plan upgrades or replacements in time
  • avoid expensive emergency fixes later

Y2K38 compliance is ultimately about future readiness. The sooner companies and developers address this issue, the smoother and more predictable the transition will be.

Y2K38: Already a Security Vulnerability

The Year 2038 Problem is not a future concern. It is already recognised in official security advisories and CVE databases. In 2025, CERT@VDE published the first confirmed Y2K38-related vulnerabilities affecting WAGO industrial devices used in critical infrastructure. Both advisories — VDE-2025-007 (CVE-2025-0101) and VDE-2025-020 (CVE-2025-1235) — describe an integer overflow in the internal time handling. When the 2038 limit is reached or intentionally triggered, systems show malfunctioning control behaviour or produce invalid log timestamps. CERT@VDE also notes that these weaknesses can be activated deliberately, for example through manual date changes or manipulated NTP signals.

Shortly afterwards, the U.S. cybersecurity agency CISA documented a further Y2K38-related vulnerability in tank-gauging systems from Dover Fueling Solutions (CVE-2025-55068). With a CVSS score of 8.2, it is classified as a critical flaw. A forged system time can force the 2038 overflow and disrupt fuel monitoring and leak detection — a clear demonstration that Y2K38 can be used as an attack vector in real industrial environments.

Earlier evidence points in the same direction. Android’s CVE-2016-3831 showed that manipulated time information could already trigger a 2038-style overflow, causing crashes and reboot loops on affected devices. Although primarily a consumer-level issue, it proved that the underlying attack method is viable.

Across all documented cases, one pattern is becoming increasingly clear: wherever the Y2K38 Bug exists, it can be triggered simply by manipulating the system time. This makes it possible to force crashes, disrupt normal operation or produce invalid data without exploiting traditional software weaknesses.

From a cybersecurity perspective, this is already a major issue today — not a risk waiting for 2038, but a growing and widely overlooked vulnerability in industrial environments, connected devices and critical infrastructure.

Early Real-World Failures

The Year 2038 Problem is not just a theoretical idea. Long before it was officially recognised, real systems had already revealed what happens when internal clocks reach their limits — entirely without cyber attacks.

A striking example occurred on 13 May 2006, when many installations of the open-source web server AOLserver suddenly began to misbehave. Throughout the spring, administrators reported that scheduled tasks stopped running, database connections froze and processes became unresponsive. The servers and networks were operating normally, yet the software seemed to fail without warning.

The cause turned out to be a simple assumption about time. Administrators had configured certain settings to keep connections open “forever,” using extremely large time values. In everyday terms this seemed harmless, but for the server it created a timestamp so far in the future that it exceeded the range its internal clock could represent.

On 13 May 2006, this calculation crossed the limit. Instead of producing a future date, the system suddenly interpreted the result as a moment in the past. From that point on, AOLserver believed that timers had already expired and that connections should be closed immediately. Tasks stopped, schedules broke and parts of the software effectively shut down.

No attack was involved — the system had simply hit the upper boundary of its own time representation.

After the issue was identified, administrators fixed it by replacing the unrealistic “forever” values with normal timeouts. But the lesson remains clear:
Real systems were already failing years before the 2038 deadline — all because of the same fundamental limitation.
A single incorrect assumption about how long “forever” should last in code was enough to disrupt production environments.

This early incident showed that the Year 2038 Problem is not theoretical or distant. It is a real and measurable source of instability that has already affected software in everyday use.

BEOZ Association – Beyond the Edge of Time

As an association, we volunteer our time to address activities related to the Year 2038 Problem. According to our statutes, this includes:

Awareness-raising and consulting for the public, authorities and economic decision-makers
Research into expected, potential and actual impacts
Development of solution concepts
Provision of information

Who is Affected?

The Year 2038 Problem can occur wherever Unix time is used. That includes application code, software libraries, file systems, operating systems, drivers and even hardware components. In many cases, Unix time is hidden deep inside frameworks and platforms, so developers and operators may not even be aware that it is there.

It is therefore difficult to say exactly which systems are affected. The number of code bases, applications and embedded devices that use time functions is effectively impossible to count. The impact also varies widely – from a harmless display error to a complete system failure.

Still, some risk groups stand out:

  • Older Unix and Linux systems with 32-bit architectures
    Classic distributions and older file systems (such as ext2 or ext3 in their original form) can produce incorrect timestamps beyond 2038.
  • 32-bit Windows and embedded Windows variants
    These are still in use in many specialised and industrial devices and often run far longer than originally planned.
  • Outdated smartphones and PCs
    Older iPhones and Android devices have already shown that setting the date beyond 2038 can lead to crashes, boot loops or other malfunctions.
  • Embedded devices and IoT systems
    Televisions, routers, industrial controllers, point-of-sale systems, access control, smart home components and many other devices contain internal clocks and time-based logic. Updates are rare, and many of these devices will still be active in 2038.

Because Unix time is used so widely, almost any modern system can be affected directly or indirectly. The real challenge is not only fixing known problems, but first discovering where Unix time is used at all.

Y2K38 in Major Operating Systems – and How the Tech Giants Handle It

The Year 2038 Problem affects operating systems at their core, because many of them were originally built on Unix time. How severely a system is impacted — and how well prepared it is — depends largely on how the underlying platform has evolved over the years. Tech companies and open‑source communities have taken very different paths to deal with the issue.

Linux: Technically Ready, Practically Not Always Updated

Linux is one of the most widespread operating systems in the world — used in servers, routers, industrial controllers, smart TVs, IoT devices and countless embedded systems. Technically, the Linux kernel has been prepared for the Year 2038 Problem for several years. Modern kernels use a 64-bit time implementation (“time64”), removing the original 2038 limitation.

The practical reality, however, is very different.
Many systems still rely on components that remain vulnerable to the Year 2038 Problem, including:

  • old 32-bit kernels, some more than a decade old
    Many of these kernel versions — more than 600 in total — are no longer maintained at all.
  • manufacturers who stop delivering updates long before devices reach end of service
    Devices often stay in operation for a decade or more, long after vendor updates have ended.
  • long-lived industrial and embedded systems that never receive kernel upgrades
    Once deployed, these systems typically run unchanged for many years.
  • older file systems and libraries that still assume 32-bit Unix time
    Even when the kernel is updated, outdated components inside the system may still use 32-bit timestamps.
  • discontinued or unmaintained Linux distributions (more than 600)
    These “dead” distributions never received an update to a Y2K38-ready kernel and remain permanently vulnerable.

Android: Planned Obsolescence and Long-Term Y2K38 Risk

Android is not a traditional Unix or Linux system, yet it is built on the same foundations: the Linux kernel and the Bionic C library, which provides core POSIX functions — including time handling. Like Unix, it stores time as the number of seconds since 1 January 1970. This method is efficient but limited. On 32-bit systems, the time value is held in a signed 32-bit counter that overflows on 19 January 2038, causing timestamps to jump back to 1901 or become negative.

This means Android inherits the same legacy issue as its Unix ancestors: the Year 2038 Problem. But instead of retroactively fixing this weakness, Google chose a different path.

The Year 2038 Problem does not expose a technical weakness of Android itself, but a structural weakness in how Google manages its own platform. For more than a decade, Google has known that the 32-bit Unix time representation would eventually fail. Despite this, millions of Android devices were shipped with exactly this limitation — all built on Google’s official codebase, using Google’s developer tools and approved through Google’s own compatibility definitions and security processes.

When the first Y2K38-related Android vulnerability became public — CVE-2016-3831, triggered by a manipulated NITZ time signal — Google reacted quickly. But the fix addressed only the symptoms: the system was restricted from setting dates beyond 2037. The underlying 32-bit time representation remained unchanged. The problem was not solved, only deferred.

Over the years, a clear pattern emerged. When a component becomes too costly to maintain, Google tends to abandon it rather than repair it. This applies to 32-bit architectures, outdated kernels and older libraries. Instead of taking responsibility for long-lived installations, Google assumes that manufacturers and markets will naturally phase out affected devices.

This approach may work in the consumer smartphone world, where replacement cycles are short. But in the embedded and IoT domain, it is irresponsible. Android now runs in systems that remain active for a decade or longer: industrial machinery, vehicles, point-of-sale terminals, control panels and display systems. Many of them rely on official Android board support packages developed by Google or by SoC vendors working closely with Google. The foundation for these systems comes from Google — but long-term maintenance does not.

The Linux kernel fixed the Year 2038 Problem in 2020. Google could have integrated this work. But Android’s central system library, Bionic, remained unchanged in its 32-bit variant. This was not a technical barrier; it was a decision. Instead of making older devices future-proof, Google allowed them to age out.

That choice shifts responsibility to others. Companies that operate Android-based systems for many years — in factories, hospitals, transport systems or retail infrastructure — are left to deal with the consequences. A platform that exists in billions of devices cannot rely on planned obsolescence as its long-term strategy.

Google’s former motto “Don’t be evil” sounds almost ironic today. Avoiding harm is not enough when foreseeable risks are ignored, especially risks embedded in a platform that shapes so much of the world’s digital infrastructure. True responsibility means ensuring that systems continue to function even as they age. In the case of the Year 2038 Problem, Google chose not to take that responsibility.

Apple’s Unix Core and the Year 2038 Problem

Beneath the polished surface of macOS and iOS runs Darwin, Apple’s own UNIX-derived operating system — and therefore a platform that also counts time as seconds since 1 January 1970. This design places Apple firmly within the historical context of the Year 2038 Problem, the moment when 32-bit Unix time overflows.

In the early generations of OS X and iOS, Apple’s platforms were fully 32-bit and therefore affected by the same limitation. Only when Apple transitioned its entire ecosystem to 64-bit — CPUs, kernel, libraries and applications — did the technical boundary effectively disappear.

Apple’s approach was similar to Google’s in one respect: both companies moved toward a 64-bit-only future. The difference lies in execution. Apple controls its hardware, software and product lifecycle far more tightly. As a result, the shift to 64-bit happened quickly and consistently, and far fewer legacy devices remain in active use. The risk is smaller — but not zero.

Despite this, Apple devices occasionally appear in environments they were never designed for: old iPhones repurposed as control panels, iPads used as diagnostic terminals, or Apple TVs embedded in museum installations and custom display systems. These devices still share the same underlying Unix time representation and therefore carry the same Year 2038 characteristics as any other pre-64-bit Unix system.

However, Apple contributes little to the long-term Y2K38 exposure of global infrastructure for a simple reason: its products rarely remain in service long enough to reach the critical date. They are not designed for decades of operation in industrial, medical or embedded systems. They follow consumer lifecycles — short, controlled and driven by regular hardware replacement.

In practice, the combination of limited device longevity and strict platform control means that Apple avoids many of the challenges other ecosystems must address with patches, architecture changes and long-term maintenance. A device that is replaced every few years will not experience the 2038 boundary, regardless of its internal time representation.

Apple products also play only a minor role in critical digital infrastructure. Data centres do not run on macOS. Hospitals do not rely on iOS. Industrial systems do not depend on Apple’s embedded hardware. Apple builds closed, highly polished consumer platforms — not the foundational systems that keep industries or public services running.

In the wider context of the Year 2038 Problem, Apple is therefore not a central actor. Its devices stand outside the long-term operational cycles where Unix time truly becomes a risk. Whether they would survive until 2038 is ultimately a theoretical question — because very few of them will still be operating when the date arrives.

Scroll to Top