Researchers advise that enterprises should assume that all their devices are impacted and vulnerable to attack. There are five vulnerabilities affecting switches, routers, cameras, and IP phones—four are critical remote code-execution (RCE) vulnerabilities, and one is a denial-of Service (DoS).
Download the PDFS
After compromising one device, a bad actor could launch an array of attacks, including gathering sensitive data captured on cameras, phones and over the network.
BlackHawk Data Protection
Our team of expert engineers is poised to help you discover your network’s vulnerabilities and mitigate your risk to attacks, breaches, and any other threats that can be detrimental to your company’s health and success.