Well,
Its not like peoples are still using telnet/ssh/web with a
password/enable on the net... anymore.
We do PCI and it took the better part of 6 month for a Customer
Network Engineer to get it right.
( The annoying part is that we cannot do the work for them, we can
only hope they get a paper cut every time we sent out a report about
that security risk )
But I'm still curious what was the attack vector...
As for my ~20ish Cisco device in the wild, they're all pretty healthy.
-----
Alain Hebert [email protected]
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911 http://www.pubnix.net Fax: 514-990-9443
On 04/13/15 17:51, Steve Mikulasik wrote:
> They may want to check if some network engineer got fired recently. Usually
> these sorts of things relate to a human problem rather than a technical
> attack.
>
> Stephen Mikulasik
>
> -----Original Message-----
> From: NANOG [mailto:[email protected]] On Behalf Of Rashed Alwarrag
> Sent: Monday, April 13, 2015 3:29 PM
> To: [email protected]
> Subject: Cisco Routers Vulnerability
>
> Hi
> Today we have a lot of customers report that their Cisco routers got a root
> access and the IOS got erased , is there any known vulnerability in cisco
> products thats they report in their Security alerts about this recently ?
> is there any one face the same issue ?
>
> Regards
>