nanog mailing list archives

Re: Cisco Routers Vulnerability


From: Alain Hebert <ahebert () pubnix net>
Date: Tue, 14 Apr 2015 09:11:43 -0400

    Well,

    Its not like peoples are still using telnet/ssh/web with a
password/enable on the net... anymore.

    We do PCI and it took the better part of 6 month for a Customer
Network Engineer to get it right.
    ( The annoying part is that we cannot do the work for them, we can
only hope they get a paper cut every time we sent out a report about
that security risk )

    But I'm still curious what was the attack vector...

    As for my ~20ish Cisco device in the wild, they're all pretty healthy.

-----
Alain Hebert                                ahebert () pubnix net   
PubNIX Inc.        
50 boul. St-Charles
P.O. Box 26770     Beaconsfield, Quebec     H9W 6G7
Tel: 514-990-5911  http://www.pubnix.net    Fax: 514-990-9443

On 04/13/15 17:51, Steve Mikulasik wrote:
They may want to check if some network engineer got fired recently. Usually these sorts of things relate to a human 
problem rather than a technical attack. 

Stephen Mikulasik

-----Original Message-----
From: NANOG [mailto:nanog-bounces () nanog org] On Behalf Of Rashed Alwarrag
Sent: Monday, April 13, 2015 3:29 PM
To: nanog () nanog org
Subject: Cisco Routers Vulnerability

Hi
Today we have a lot of customers report that their Cisco routers got a root access and the IOS got erased , is there 
any known vulnerability in cisco products thats they report in their Security alerts about this recently  ?
 is there any one face the same issue ?

Regards



Current thread: