Cisco Finds New Zero Day Bug, Pledges Patches in Days
Submitted 1 year ago by tym@lemmy.world to technology@lemmy.world
https://www.darkreading.com/application-security/cisco-zero-day-bug-patches-in-days
Submitted 1 year ago by tym@lemmy.world to technology@lemmy.world
https://www.darkreading.com/application-security/cisco-zero-day-bug-patches-in-days
nbailey@lemmy.ca 1 year ago
Or, hear me out, maybe we don’t expose network management interfaces to untrusted networks? Sure, shit can still get breached by very deep intrusions, but at least you don’t show up on shodan!?
tym@lemmy.world 1 year ago
This is the way. It baffles me how often I have to have ‘the talk’ with IT people. Don’t be lazy, create a secure tunnel into the LAN!
Oisteink@feddit.nl 1 year ago
I’ve discovered interfaces left behind on lan vlans - and they’re all set up with separate mgmt network, so why make one on LAN for some quick test and leave it behind. With web, cli and api open….
kinther@lemmy.world 1 year ago
At least have a source ip access list only allowing trusted IP ranges. Ideally it would only be reached from an internal IP range or bastion host, but not all companies have a security hat to wear.
p03locke@lemmy.dbzer0.com 1 year ago
This is the barest of minimalistic security. It’s a router. You don’t allow external admin access to the router. Period. End of story.
_dev_null@lemmy.zxcvn.xyz 1 year ago
Indeed, from a tenable article:
So yeah, maybe not widen your attack surface to the whole fucking internet in the first place.