[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
NSA able to compromise Cisco, Juniper, Huawei switches
- Subject: NSA able to compromise Cisco, Juniper, Huawei switches
- From: ckossmey at cisco.com (Clay Kossmeyer)
- Date: Mon, 30 Dec 2013 16:18:41 -0500
Hi Folks -
Clay Kossmeyer here from the Cisco PSIRT.
We've published the following document in response to the original (Dec. 29) Der Spiegel article:
http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20131229-der-spiegel
and are investing the claims in the Dec. 30 Der Spiegel article referencing 'persistent implants' for the PIX and ASA product lines under case number PSIRT-1384943056.
Any vulnerabilities we discover will be disclosed via our standard vulnerability handling process documented here:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
I'm not currently subscribed to NANOG, so if you have a reply you'd like me to see, please copy me directly.
Regards,
Clay
-----
Found some interesting news on one of the Australia news websites.
http://www.scmagazine.com.au/News/368527,nsa-able-to-compromise-cisco-juniper-huawei-switches.aspx
Regards,
Steven.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 204 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20131230/4f19cd6d/attachment-0001.bin>