@thehatfox to TechnologyEnglish • 1 year agoBackdoored firmware lets China state hackers control routers with “magic packets”arstechnica.comexternal-linkmessage-square36arrow-up1415arrow-down115cross-posted to: [email protected][email protected]technology[email protected]
arrow-up1400arrow-down1external-linkBackdoored firmware lets China state hackers control routers with “magic packets”arstechnica.com@thehatfox to TechnologyEnglish • 1 year agomessage-square36cross-posted to: [email protected][email protected]technology[email protected]
minus-squareUnaware7013linkfedilink20•1 year agoI wonder if they’re using default/hard coded creds (Ciscos have had a ton of them) or if its just bad password hygiene on the admins’ part.
minus-squarepartial_accumenlinkEnglish24•1 year agoHardcoded creds seems like a really bad idea on a network appliance. If they MUST have hardcoded creds how about they only work when sent through a serial console at least your attacker would have to have local physical access to the device.
minus-square@[email protected]linkfedilinkEnglish9•1 year agoI do agree, and Cisco immediately grabbed the occasion to push their shitty restrictive trusted boot policy. Which is worrying.
I wonder if they’re using default/hard coded creds (Ciscos have had a ton of them) or if its just bad password hygiene on the admins’ part.
Hardcoded creds seems like a really bad idea on a network appliance. If they MUST have hardcoded creds how about they only work when sent through a serial console at least your attacker would have to have local physical access to the device.
I do agree, and Cisco immediately grabbed the occasion to push their shitty restrictive trusted boot policy. Which is worrying.