Cisco stomped out a critical vulnerability in its IP Phone web server that could enable remote code execution by an unauthenticated attacker. Cisco is warning of a critical flaw in the web server of ...
The most serious vulnerabilities in Cisco’s 8800 Series IP Phones could allow unauthenticated, remote attackers to conduct a cross-site request forgery attack or write arbitrary files to the ...
Cisco has disclosed today a high-severity zero-day vulnerability affecting the latest generation of its IP phones and exposing them to remote code execution and denial of service (DoS) attacks. The ...
Cisco Systems issued a warning on Wednesday that some of its IP phones could be compromised, allowing unauthorized individuals to bypass security restrictions. In the warning, Cisco detailed flaws for ...
Cisco this week advised customers using its 7800 and 8800 series IP phones they should patch a variety of high-priority vulnerabilities that could lead to denial of service and other security problems ...
Cisco has gone ahead and disclosed a critical flaw in a range of its internet protocol (IP) phones. However, it had originally wanted to break from its own 90-day disclosure policy due to "extenuating ...
John Breeden II is an award-winning reviewer with more than 20 years of experience covering technology. Follow him on Twitter @TheLabGuys. Office phones have come a long way in a relatively short time ...
Cisco released on Wednesday security patches for vulnerabilities present in its IP Phone 7800 and 8800 series. An attacker could exploit most of the flaws remotely without being authenticated. The ...
Cisco IP phones, which can be found in many offices, have a security vulnerability that lets hackers take total control of them from the outside. A team of computer scientists at Columbia University ...
I've got a problem, I've been trying to implement some layer2 security on our switches with Port-Security, only allowing 2 MAC addresses on any 1 switchport. I've been looking at some of our switches ...
Ang Cui has spent 10 years hacking into internet-connected office phones and other “embedded devices”—that is, devices that don't look like computers or servers but have all the trappings: a processor ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results