Using ArubaOS?
Do this: Patch immediately.
Why: Aruba recently released patches addressing six critical-severity vulnerabilities including command injection flaws and buffer overflow problems.
Additional Info: https://www.bleepingcomputer.com/news/security/aruba-networks-fixes-six-critical-vulnerabilities-in-arubaos/?&web_view=true
Using Cisco's IP Phone Series?
Do this: Patch immediately.
Why: Cisco recently released patches addressing a critical-severity flaw effecting it's IP phone 6800, 7800, 7900, and 8800 series products allowing an attacker to inject arbitrary code.
Additional Info: https://thehackernews.com/2023/03/critical-flaw-in-cisco-ip-phone-series.html
Using Trusted Platform Module (TPM) 2.0 Reference Library?
Do this: Update immediately.
Why: Users are recommended to apply the updates released by TCG as well as other vendors to address the flaws and mitigate supply chain risks.
Additional Info: https://thehackernews.com/2023/03/new-flaws-in-tpm-20-library-pose-threat.html
Send Us Your Comments
What did you think of this article? Send us a note to let us know what you liked, would like to see more of, or what we can do better. And don't be surprised if we reach back out with a small 'thank you' gift for your feedback.