4.9 • 696 Ratings
🗓️ 20 July 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Friday, July 20th, 2018 edition of the Sandtonet Storm Center's Stormcast. |
0:07.4 | My name is Johannes Ulrich, and the I'm recording from Washington, D.C. |
0:12.0 | Cisco released another set of updates yesterday, fixing 23 different flaws across its products. |
0:21.0 | Now, one product particularly hit hard this time is Cisco's policy suite. |
0:27.6 | It was hit with four critical vulnerabilities, meaning they provide unauthenticated access |
0:33.2 | to a net hacker. |
0:34.7 | Now, one of these vulnerabilities was yet another default password. |
0:39.7 | That is a good and a bad side to policy suite being affected. First of all, it's not a very |
0:45.6 | popular product. It's really something that's only used by large enterprises, by ISPs and |
0:51.8 | such, to define bandwidth rules across their network. |
0:56.7 | So this is nothing you'll find in smaller companies and hopefully the people who do run this |
1:03.4 | particular piece of software have been informed by Cisco. |
1:07.4 | But the bad part to it, well, it is being run by very large networks and as a result, |
1:13.2 | if it's not being fixed, then this could lead to some larger disruption. Well, talking about |
1:20.8 | some more popular devices, researchers at positive technologies found vulnerabilities in a home vacuum cleaner. |
1:30.3 | Now this particular vacuum cleaner isn't exactly a market leader. |
1:34.3 | It's Dong Kwan DG-360. |
1:38.3 | I couldn't find it on the US Amazon website, so not sure in what countries it's actually being sold one little twist |
1:46.6 | this particular model brings to vacuum cleaners is that it also acts as a video |
1:52.6 | surveillance system you can remote control the vacuum cleaner and using a built-in |
1:58.2 | camera you can essentially check if everything is okay at home. |
2:03.2 | Of course, that particular part does lend itself to abuse, and yes, there are vulnerabilities |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.