Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Network access storage devices are highly exploitable

Network access storage devices are highly exploitable

2014/08/08

Softpedia - (International) A researcher from Independent Security Evaluators presenting at the Black Hat 2014 conference reported finding a wide variety of vulnerabilities in network access storage (NAS) devices from several manufacturers, including directory traversal, command injection, memory corruption, authentication bypass, or back door vulnerabilities.

Source: http://news.softpedia.com/news/Network-Access-Storage-Devices-Are-Highly-Exploitable-454103.shtml

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:21:19