Remove Firmware Remove Security Defenses Remove Wireless
article thumbnail

Vulnerability Recap 9/9/24 – Exploited Vulnerabilities Persist

eSecurity Planet

The problem: D-Link’s DAP-2310 Wireless Access Point vulnerability known as “BouncyPufferfish” allows for unauthenticated remote code execution. ” To reduce risks, replace unsupported equipment, apply available firmware updates, and keep an accurate IT asset inventory. or later to fix the vulnerability.

Firmware 109
article thumbnail

Vulnerability Recap 8/12/24 – Old Vulnerabilities Unexpectedly Emerge

eSecurity Planet

If exploited, the vulnerability would allow a threat actor to execute their own code within the processor’s firmware using System Management Mode (SMM). This can happen even when SMM is locked. The threat actor must get there first before they can exploit this flaw; this could be part of the reason it hasn’t been heavily exploited.

Firmware 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulnerability Recap 8/13/24 – Old Vulnerabilities Unexpectedly Emerge

eSecurity Planet

If exploited, the vulnerability would allow a threat actor to execute their own code within the processor’s firmware using System Management Mode (SMM). This can happen even when SMM is locked. The threat actor must get there first before they can exploit this flaw; this could be part of the reason it hasn’t been heavily exploited.

Firmware 104
article thumbnail

What Is Industrial Control System (ICS) Cyber Security?

eSecurity Planet

Industrial networks include wired and wireless technologies such as Ethernet, Modbus, and Profibus. Encryption and secure communication protocols: Protecting data in transit between ICS components. Patch management: Keeping software and firmware up to date to close security gaps.

Firmware 109