![]() In regard to the IoT Inspector report that identified 20 vulnerabilities within our Linksys Velop MR9600 system, 10 of them were deemed not valid, two of them have been fixed and will soon be rolled out to our customers (DNSMASQ/DNSPOOQ), 1 issue is actively being addressed as part of a larger internal security initiative within Linksys (default passwords), and 7 issues were deemed "low" priority as we do not believe they pose a serious security risk to our customers. We make it a point to provide firmware updates to our active products with known vulnerabilities, whether they are reported to us through our disclosure program, from a third-party report or discovered internally. For more tips on how to secure your home network, see here. Also be sure to enable automatic updates so that you receive the latest updates for your device as soon as they are available. As always, make sure you use strong, complex passwords for your router and Smart Wi-Fi Cloud account. We use an implementation of log4j in our Linksys Smart Wi-Fi Cloud, but that is not impacted by this vulnerability. None of our Linksys physical hardware devices (routers, mesh, range extenders) use log4j and are not affected by the vulnerability. Linksys has reviewed the recent log4j vulnerability known as Log4Shell. Reaper Botnet Vulnerability (Date: 10/25/17) Reaper Botnet Vulnerability on E-Series Routers (Date: 10/31/17)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |