Have you not seen Shameless? That's entirely possible.

Adam Kennedy

Network & Systems Engineer

*Watch Communications*

(866) 586-1518

[email protected]

On Tue, Mar 21, 2017 at 6:51 PM, Matt Hoppes <
[email protected]> wrote:

> Vulnerability, yes, as much as the ability to steal my car by diving
> into the driver seat while I'm in the ghetto of Philadelphia ideling
> with the door open is a vulnerability.
>
> On 3/21/17 6:39 PM, Mike Hammett wrote:
> > It's still a vulnerability. Don't try to throw any dirt on it.
> >
> >
> >
> > -----
> > Mike Hammett
> >
> > Intelligent Computing Solutions <http://www.ics-il.com/>
> > <https://www.facebook.com/ICSIL><https://plus.google.com/+
> IntelligentComputingSolutionsDeKalb><https://www.linkedin.
> com/company/intelligent-computing-solutions><https://twitter.com/ICSIL>
> >
> > Midwest Internet Exchange <http://www.midwest-ix.com/>
> > <https://www.facebook.com/mdwestix><https://www.
> linkedin.com/company/midwest-internet-exchange><https://
> twitter.com/mdwestix>
> >
> > The Brothers WISP <http://www.thebrotherswisp.com/>
> > <https://www.facebook.com/thebrotherswisp><https://www.
> youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
> > ------------------------------------------------------------------------
> > *From: *"Matt Hoppes" <[email protected]>
> > *To: *"Ubiquiti Users Group" <[email protected]>
> > *Sent: *Tuesday, March 21, 2017 5:28:02 PM
> > *Subject: *Re: [Ubnt_users] airOS Vulnerability Issue Update
> >
> > It is true... however to call it a vulnerability is a bit excessive.
> >
> > You literally have to be logged into a radio, while using an old
> > browser, while browsing a shady site that specifically attacks your
> radio.
> >
> > On 3/21/17 4:12 PM, Eduardo wrote:
> >> We got this notification from UBNT. Did anyone else also get it?
> >>
> >> Is this true, another vulnerability?
> >>
> >> Thanks,
> >> Eduardo
> >>
> >>
> >>
> >> *From:*Ubiquiti Networks [mailto:[email protected]]
> >> *Sent:* Monday, March 20, 2017 11:33 AM
> >> *Subject:* airOS Vulnerability Issue Update
> >>
> >>
> >>
> >> Addressing Security Concerns. We take network security very seriously
> >> and have fixed the command injection vulnerability for all affected
> >> products: airMAX®, airGateway®, TOUGHSwitch™, and airFiber®......
> >>
> >> Ubiquiti Networks
> >>
> >>
> >>
> >> SOFTWARE
> >>
> >>
> >>
> >> OPERATOR
> >>
> >>
> >>
> >> UNIFI
> >>
> >>
> >>
> >> CONSUMER
> >>
> >>
> >>
> >> PRODUCTS
> >>
> >>
> >>
> >> BUY
> >>
> >>
> >>      I M P O R T A N T
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>   Addressing Security Concerns
> >>
> >> We take network security very seriously and have fixed the authenticated
> >> command injection vulnerability for all affected products: airMAX®,
> >> airGateway®, TOUGHSwitch™, and airFiber®; please upgrade the firmware
> >> for your devices. UniFi®, EdgeMAX®, and AmpliFi™products are not
> affected.
> >>
> >> While we acknowledge that all vulnerabilities are serious, we believe
> >> this issue rates fairly low in terms of threat severity, because it
> >> requires being authenticated to the management web interface, or
> >> tricking an authenticated administrator into opening a targeted, crafted
> >> URL in the browser where they are logged in to the affected device.
> >> Ubiquiti strongly backs our security measures:
> >>
> >> ·         Dedicated Security Director focused 100% on Ubiquiti®software
> >> vulnerabilities and supported by a strong group of engineers
> >>
> >>
> >>
> >> ·         Participation in third-party vulnerability assessment programs
> >> such as HackerOne, where we have given out substantial rewards
> >>
> >>
> >>
> >> ·         Significant investment retaining third-party external security
> >> audit company to review our software solutions frequently
> >>
> >> We’re currently addressing the php2 code concern, which will be
> >> eliminated from applicable code bases within the next few weeks.
> >>
> >>
> >>
> >>
> >>
> >>
> >>   Latest Firmware Updates
> >>
> >> Ubiquiti has updated the firmware for the affected devices. Please
> >> update the firmware of your devices to the version listed here:
> >>
> >>
> >>
> >> DEVICES
> >>
> >>
> >>
> >> USE FIRMWARE
> >>
> >>
> >>
> >> v6.0.1 or later
> >>
> >>
> >>
> >> v8.0.1 or later
> >>
> >>
> >>
> >> v1.3.4 or later
> >>
> >>
> >>
> >> v1.1.8 or later
> >>
> >>
> >>
> >> v3.2.2 or later
> >>
> >>
> >>
> >> v3.2.2 or later
> >>
> >>
> >>
> >> v3.4.1 or later
> >>
> >>
> >>
> >> v3.6.1 or later
> >>
> >>
> >>
> >> For questions, contact our support team.
> >>
> >> Copyright © 2017, Ubiquiti Networks, Inc. All Rights Reserved.
> >> Ubiquiti Networks 685 Third Avenue, 27th Floor New York, NY 10017 USA
> >>
> >> Share this on:
> >>
> >> Unsubscribe   |    Update Preferences   |    View in browser
> >>
> >> Follow: Facebook   |    Twitter   |    YouTube
> >>
> >>
> >>
> >>
> >>
> >> _______________________________________________
> >> Ubnt_users mailing list
> >> [email protected]
> >> http://lists.wispa.org/mailman/listinfo/ubnt_users
> >>
> > _______________________________________________
> > Ubnt_users mailing list
> > [email protected]
> > http://lists.wispa.org/mailman/listinfo/ubnt_users
> >
> >
> >
> > _______________________________________________
> > Ubnt_users mailing list
> > [email protected]
> > http://lists.wispa.org/mailman/listinfo/ubnt_users
> >
> _______________________________________________
> Ubnt_users mailing list
> [email protected]
> http://lists.wispa.org/mailman/listinfo/ubnt_users
>
_______________________________________________
Ubnt_users mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/ubnt_users

Reply via email to