<p>The SSH server on RUGGEDCOM ROS devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device.</p>
<p>Siemens has released new versions for the affected products and recommends to update to the latest versions.</p>
Source link
Subscribe to Updates
Get the latest creative news from FooBar about art, design and business.
Previous Article[Control systems] CISA ICS security advisories (AV26–417)
Next Article Summer of CCNA LIVE Launch Party
Related Posts
Add A Comment