On Thu, 09 Jul 2015 07:27:16 -0400, Jared Mauch <ja...@puck.nether.net>
wrote:
Really just people not patching their software after warnings more than
six months ago:
A lot goes into "updates". Not the least of which is *knowing* about the
issue. Then getting the patched code, then lab testing, then regulatory
approval(s), then maintenance window(s)...
Cisco has released free software updates that address these
vulnerabilities. Workarounds that mitigate some of these vulnerabilities
are available.
"Free" if you have a support contract. (the clause 3 "contact TAC" method
is all too often a serious pain in the ass.)
--Ricky