@[email protected] to [email protected]English • 9 months agoBackdoored firmware lets China state hackers control routers with “magic packets”arstechnica.comexternal-linkmessage-square36fedilinkarrow-up1411arrow-down112cross-posted to: [email protected][email protected][email protected][email protected]
arrow-up1399arrow-down1external-linkBackdoored firmware lets China state hackers control routers with “magic packets”arstechnica.com@[email protected] to [email protected]English • 9 months agomessage-square36fedilinkcross-posted to: [email protected][email protected][email protected][email protected]
minus-squareUnaware7013linkfedilink20•9 months agoI wonder if they’re using default/hard coded creds (Ciscos have had a ton of them) or if its just bad password hygiene on the admins’ part.
minus-squarepartial_accumenlinkfedilinkEnglish24•9 months agoHardcoded creds seems like a really bad idea on a network appliance. If they MUST have hardcoded creds how about they only work when sent through a serial console at least your attacker would have to have local physical access to the device.
minus-square@[email protected]linkfedilinkEnglish9•9 months agoI do agree, and Cisco immediately grabbed the occasion to push their shitty restrictive trusted boot policy. Which is worrying.
I wonder if they’re using default/hard coded creds (Ciscos have had a ton of them) or if its just bad password hygiene on the admins’ part.
Hardcoded creds seems like a really bad idea on a network appliance. If they MUST have hardcoded creds how about they only work when sent through a serial console at least your attacker would have to have local physical access to the device.
I do agree, and Cisco immediately grabbed the occasion to push their shitty restrictive trusted boot policy. Which is worrying.