This topic contains 1 reply, has 2 voices, and was last updated by mangets 1 month, 1 week ago.
- January 24, 2021 at 2:05 pm #355184
Cisco Vulnerabilities Demonstrate All That’s Wrong with Today’s Patching Processes
- January 24, 2021 at 2:06 pm #355186
I feel like it is known, but I learned that only when you realize the limits of your team(and yours) the technical ability to defend against attacks is happening, you can then apply a threat model to see which attacks are not practical given your assets.
- January 24, 2021 at 2:06 pm #355187
The solution in the article, ”move to cloud, cloud vendor handles the patching” is a bit naive IMO. As if the same problems would not apply to cloud providers, and they might require even more time for testing so they don’t break their entire cloud with a rushed update.
- January 24, 2021 at 2:06 pm #355188
Interesting read. It’s important to mention that the article talks about vulnerabilities found on September 2020
Zone-based firewall feature vulnerabilities [CVE-2020-3421](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-94ckG4G) and [CVE-2020-3480]
(https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-94ckG4G) and DVMRP feature vulnerabilities [CVE-2020-3566 and CVE-2020-3569](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz)
I can’t say I agree with [Cisco approach](https://www.zdnet.com/article/cisco-says-it-wont-patch-74-security-bugs-in-older-rv-routers-that-reached-eol/) when it comes to security
You must be logged in to reply to this topic.