• Nasty Cisco attack

    Author
    Topic
    #501724

    Nasty Cisco Attack

    Schneier on Security

    https://www.schneier.com/blog/archives/2015/08/nasty_cisco_att.html

    This is serious: Cisco Systems officials are warning customers of a series of attacks that completely hijack critical networking gear by swapping out the valid ROMMON firmware image with one that’s been maliciously altered…. [continue reading at above link if interested]

    Viewing 2 reply threads
    Author
    Replies
    • #1523971

      My Realtek wireless driver includes Cisco Modules – wonder if Realtek are doing anything about it.

    • #1523976

      Needs admin password or physical access though.

      • #1523977

        I don’t know which firmware my TalkTalk router uses but they can access it remotely using TR069.

        • #1523979

          I don’t know which firmware my TalkTalk router uses but they can access it remotely using TR069.

          Without a password?

          • #1524037

            Without a password?

            Yes – I’ve seen there is an Admin URL path they can use in the router Tools section, although I have the option to turn TR069 off.

            This router gets auto firmware updates when there are any and on one occasion when I noticed that Interleaving was Off, I phoned TT and they enabled it although I think that is something they have to do at their end rather than a setting in the router, as I haven’t seen any UI settings for that.

    • #1524632

      Well if you are already exec you already own it. 😎

      :cheers:

      🍻

      Just because you don't know where you are going doesn't mean any road will get you there.
    Viewing 2 reply threads
    Reply To: Nasty Cisco attack

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: