Detected two extremely serious vulnerabilities in the rConfig utility
According to NIST (National Institute of Standards and Technology), the rConfig vulnerability is rated as serious as 9.8 / 10.
Security researcher Mohammad Askar recently discovered two vulnerabilities in the rConfig tool, a commonly used network configuration management utility. These two vulnerabilities are considered serious, at least one of which can allow hackers to gain access to the target server and connected network devices, then hijack the device.
- Warning: Google Chrome is experiencing serious security errors, patch updates right away
- Warning: Detecting a very serious vulnerability in Cyberoam, a common firewall system in Vietnam
These two vulnerabilities affect all versions of rConfig, including the latest version 3.9.2. According to NIST (National Institute of Standards and Technology), the rConfig vulnerability is rated as serious as 9.8 / 10. Currently, there is no security patch for these 2 vulnerabilities.
Vietnam Cyber Security Company VSEC said that many Vietnamese businesses will be directly affected by this vulnerability. The network managed by rConfig utility can be easily attacked and controlled by hackers.
In Vietnam, more than 10,000 devices belonging to large networks in enterprises are using the rConfig utility.
Due to the absence of a patch, VSEC recommends that units using rConfig should do the following to avoid unfortunate incidents that may occur.
- Restrict IP address access to the system.
- If not used, block access to the ajaxServerSettingsChk.php module or use alternative administrative solutions.
- As soon as the patch is released, update now.
You should read it
- The best network configuration management tools and software
- Explore System Configuration Utility
- Explore Mac's Network Utility
- 5 new tab management utilities for Chrome and Firefox
- About the Diskpart command line utility
- Change the new tab interface on Firefox with 4 stylish add-ons
- Set up Wi-Fi network only 3 steps
- How to use Disk Utility to repair the hard drive and decentralize the drive
- Network communication utilities in Unix / Linux
- Use Disk Utility to copy the drive on Mac
- Activate Disk Utility's Debug menu
- How to Build a Utility Trailer
Maybe you are interested
Learn about shutter speed in digital photography The Windows era will continue until 2023 8 types of vegetables can be grown at home from the original stems How to keep calm when stressed, angry 19 soft skills that those who want to be good leaders must also have Why often have white smoke streaks in the sky after the plane flies over?