Abuse Melding

Je hebt een klacht over de onderstaande posting:

24-07-2017, 16:08 door Anoniem

Inmarsat Product Management Team This AC8 security vulnerability was identified to Inmarsat by a third party earlier in 2017. Inmarsat issued a security patch which can be applied to AC8 to greatly reduce the risk of this vulnerability, and remove the ability to download and activate AC8 from our public website. The third party that identified this security used a copy of AC8 email client software that was downloaded and installed in a lab environment. However, from a customer perspective it is considered very difficult to exploit this vulnerability because it requires direct access to the shipboard PC which runs the AC8 email client – meaning either direct physical access to the PC (the intruder would need to get aboard ship access the computer, bypassing port and IT security), or remote access via the Internet. Remote access is very unlikely because it is blocked by Inmarsat shoreside firewalls. More importantly, the AC8 software had already been scheduled for End of Life (EoL) by Inmarsat, which ...

Beschrijf je klacht (Optioneel):

captcha