About the thread "Cisco Routers Vulnerability"
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Rashed, NANOG members: Hi there. My name is Dario Ciccarone and I work as an Incident Manager on the Cisco PSIRT - the Product Security Incident Response Team. We saw your email to the NANOG list, with the subject "Cisco Routers Vulnerability". At this time, we're not aware of any attempts to exploit either a known or previously unknown vulnerability on any Cisco devices running Cisco IOS, Cisco IOS XE, Cisco IOS XR, Cisco NX-OS or any other Cisco operating systems. We invite you to follow-up with us directly by emailing the PSIRT alias, or by using any of the mechanisms listed at the following URL: http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.... Thanks, Dario Dario Ciccarone Incident Manager - CCIE #10395 Product Security Incident Response Team (PSIRT) Cisco Systems, Inc. PGP Key ID: 0xBA1AE0F0 http://www.cisco.com/go/psirt -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iEYEARECAAYFAlUsRjcACgkQjJUYH7oa4PD5WwCcCk0l6bxnLEuBu4q0rwb7CLMU jXQAnjgvDscnF8hHBhRWB5o8iHALDmsu =dg/d -----END PGP SIGNATURE-----
participants (1)
-
Dario Ciccarone