<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Enterasys Response to US-CERT Vulnerability Advisory VU#362332 in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/enterasys-response-to-us-cert-vulnerability-advisory-vu-362332/m-p/44064#M230</link>
    <description>Article ID: 13278 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
I-Series&lt;BR /&gt;
G-Series&lt;BR /&gt;
D-Series&lt;BR /&gt;
SecureStack C3, C2, B3, B2, A2&lt;BR /&gt;
RBT3K-AG, RBT3K-1G&lt;BR /&gt;
RBTR2-A &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Discussion&lt;/B&gt;&lt;BR /&gt;
On August 2 2010, US-CERT issued advisory &lt;A href="http://www.kb.cert.org/vuls/id/362332" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.kb.cert.org/vuls/id/362332&lt;/A&gt;. &lt;BR /&gt;
&lt;BR /&gt;
The advisory overview...Some products based on [Wind River] VxWorks have the WDB&lt;BR /&gt;
target agent debug service enabled by default. This service&lt;BR /&gt;
provides read/write access to the device's memory and&lt;BR /&gt;
allows functions to be called.The advisory impact...An attacker can use the debug service to fully compromise&lt;BR /&gt;
the device.The advisory lists a number of affected vendors, including Enterasys Networks. &lt;BR /&gt;
&lt;BR /&gt;
If within the advisory the hyperlinked &lt;A href="http://www.kb.cert.org/vuls/id/MAPG-86JRWV" target="_blank" rel="nofollow noreferrer noopener"&gt;Enterasys Networks&lt;/A&gt; Information still reads "No statement is currently available from the vendor regarding this vulnerability.", then please refer to &lt;A href="https://extremenetworks.box.com/shared/static/33it0dtlo8oa60r08uhn.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;this statement&lt;/A&gt; (.pdf, 240 KB) submitted to US-CERT on August 27 2010.</description>
    <pubDate>Tue, 03 Dec 2013 03:48:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2013-12-03T03:48:00Z</dc:date>
    <item>
      <title>Enterasys Response to US-CERT Vulnerability Advisory VU#362332</title>
      <link>https://community.extremenetworks.com/t5/faqs/enterasys-response-to-us-cert-vulnerability-advisory-vu-362332/m-p/44064#M230</link>
      <description>Article ID: 13278 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
I-Series&lt;BR /&gt;
G-Series&lt;BR /&gt;
D-Series&lt;BR /&gt;
SecureStack C3, C2, B3, B2, A2&lt;BR /&gt;
RBT3K-AG, RBT3K-1G&lt;BR /&gt;
RBTR2-A &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Discussion&lt;/B&gt;&lt;BR /&gt;
On August 2 2010, US-CERT issued advisory &lt;A href="http://www.kb.cert.org/vuls/id/362332" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.kb.cert.org/vuls/id/362332&lt;/A&gt;. &lt;BR /&gt;
&lt;BR /&gt;
The advisory overview...Some products based on [Wind River] VxWorks have the WDB&lt;BR /&gt;
target agent debug service enabled by default. This service&lt;BR /&gt;
provides read/write access to the device's memory and&lt;BR /&gt;
allows functions to be called.The advisory impact...An attacker can use the debug service to fully compromise&lt;BR /&gt;
the device.The advisory lists a number of affected vendors, including Enterasys Networks. &lt;BR /&gt;
&lt;BR /&gt;
If within the advisory the hyperlinked &lt;A href="http://www.kb.cert.org/vuls/id/MAPG-86JRWV" target="_blank" rel="nofollow noreferrer noopener"&gt;Enterasys Networks&lt;/A&gt; Information still reads "No statement is currently available from the vendor regarding this vulnerability.", then please refer to &lt;A href="https://extremenetworks.box.com/shared/static/33it0dtlo8oa60r08uhn.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;this statement&lt;/A&gt; (.pdf, 240 KB) submitted to US-CERT on August 27 2010.</description>
      <pubDate>Tue, 03 Dec 2013 03:48:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/enterasys-response-to-us-cert-vulnerability-advisory-vu-362332/m-p/44064#M230</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2013-12-03T03:48:00Z</dc:date>
    </item>
  </channel>
</rss>

