Here’s the thing I don’t get…  You have X provider supplying routers with 
vulnerable firmware that have remote support (TR-069) enabled.
Why would Check Point not at least name and shame, instead of trying to market 
their security?  I know the hack is old, but grandma isn’t probably up to date 
on the latest firmware that should have been upgrade through TR-069.  I’m 
honestly more upset with the reporting than the normal residential cpe didn’t 
get upgraded.

But yeah, Happy Holidays everyone...

Sincerely,

Eric Tykwinski
TrueNet, Inc.
P: 610-429-8300
F: 610-429-3222

> On Dec 19, 2014, at 5:54 PM, Jay Ashworth <j...@baylink.com> wrote:
> 
> While the flaw is 12 years old and the fix 9, the article suggests that
> firmware for consumer routers may yet be being built with the vulnerable
> webserver code baked in.
> 
> If you are responsible for lots of eyeballs you might want to look at this.
> 
> http://arstechnica.com/security/2014/12/12-million-home-and-business-routers-vulnerable-to-critical-hijacking-hack/
> 
> Have a nice Christmas weekend.  :-)
> 
> Cheers,
> -- jra
> 
> -- 
> Jay R. Ashworth                  Baylink                       
> j...@baylink.com
> Designer                     The Things I Think                       RFC 2100
> Ashworth & Associates       http://www.bcp38.info          2000 Land Rover DII
> St Petersburg FL USA      BCP38: Ask For It By Name!           +1 727 647 1274


Reply via email to