9 Jul
2015
9 Jul
'15
5:35 p.m.
On Thu, 09 Jul 2015 07:27:16 -0400, Jared Mauch <jared@puck.nether.net> wrote:
Really just people not patching their software after warnings more than six months ago:
A lot goes into "updates". Not the least of which is *knowing* about the issue. Then getting the patched code, then lab testing, then regulatory approval(s), then maintenance window(s)...
Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.
"Free" if you have a support contract. (the clause 3 "contact TAC" method is all too often a serious pain in the ass.) --Ricky