Once you’re within the network from this point, you can pivot onto the DLP box."Īs for the basic weaknesses, one was an unauthenticated stored cross-site scripting (XSS) flaw, where it was possible to execute malicious JavaScript code as an administrator of the affected technology. "This can be targeted with an unauthenticated remote code exploit. But they found another issue in InterScan, another Trend product that acts as the outfacing system that protects the network. The attack would require an initial breach of the network. It's pretty nasty, to say the least," added Seeley. "It's a full compromise of the complete network once you own the node.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |