Well, Its not like peoples are still using telnet/ssh/web with a password/enable on the net... anymore.
We do PCI and it took the better part of 6 month for a Customer Network Engineer to get it right. ( The annoying part is that we cannot do the work for them, we can only hope they get a paper cut every time we sent out a report about that security risk ) But I'm still curious what was the attack vector... As for my ~20ish Cisco device in the wild, they're all pretty healthy. ----- Alain Hebert aheb...@pubnix.net PubNIX Inc. 50 boul. St-Charles P.O. Box 26770 Beaconsfield, Quebec H9W 6G7 Tel: 514-990-5911 http://www.pubnix.net Fax: 514-990-9443 On 04/13/15 17:51, Steve Mikulasik wrote: > They may want to check if some network engineer got fired recently. Usually > these sorts of things relate to a human problem rather than a technical > attack. > > Stephen Mikulasik > > -----Original Message----- > From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Rashed Alwarrag > Sent: Monday, April 13, 2015 3:29 PM > To: nanog@nanog.org > Subject: Cisco Routers Vulnerability > > Hi > Today we have a lot of customers report that their Cisco routers got a root > access and the IOS got erased , is there any known vulnerability in cisco > products thats they report in their Security alerts about this recently ? > is there any one face the same issue ? > > Regards >