Comments
-
So the actual security hole isn't fixed?
-
So can we assume that an authenticated user is able to manipulate the device to run administrative commands. Or are they able to bypass authentication entirely meaning 2fa is a good to have but useless against this attack. I can understand why you are skating around the issue, but should we assume the worst. e.g If you…