Yes, the vulnerabilities are really real! One of the latest reports came from the ICS-CERT ALERT the other day.
Excerpt: “… the vulnerabilities are exploitable remotely by authenticating to the service using hard-coded credentials. Exploitation of these vulnerabilities would allow attackers to remotely connect to the server and executing remote code, possibly affecting the availability and integrity of the device.”
Recommendation: Take the security risks very serious – technical people, managers, accountant people, researcher, consultants, vendors, users, … ALL!!
More to come.
Get prepared to expect the unexpected.
No comments:
Post a Comment