![]() ![]() All other Digi Accelerated Linux (DAL) products are not affected. Here is the link to our knowledge-based article that goes into detail on WiFi Frag Attackįrag Attack Security Information Security Update for OpenSSL Critical CVE’s: CVE-2022-3786 and CVE-2022-3602ĭigi International is looking into the new Critical OpenSSL vulnerabilities, CVE-2022-3786, and CVE-2022-3602.Ĭurrently, the EX50 and TX64 devices are vulnerable to CVE-2022-3786 and CVE-2022-3602. Learn More Following up with Digi's previous announcement of WiFi Frag Attack. If you have any questions or concerns, please do not hesitate to contact our support team. ![]() We take the security of our products very seriously and apologize for any inconvenience this may cause. Our development team has already developed a patch for this vulnerability and we strongly recommend that you apply the update as soon as possible to ensure the security of your device. Please see our knowledge-based article for the patch releases related to this vulnerability. Digi has found that it is appropriate to patch the vulnerability. Learn More Ripple20 Public Disclosureĭigi International has recently become aware that CVE-2020-11901 is still impacting our NDS and NET+OS product lines, which were part of Ripple20 vulnerabilities. Included is a table of Digi International products that were reported as vulnerable by Dragos. These are CVEs that Dragos reported to us, Digi International. The attached document includes vulnerability findings from a report that Dragos submitted. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |