• SayCyberOnceMore@feddit.uk
    link
    fedilink
    English
    arrow-up
    8
    ·
    28 days ago

    Skimming through the Qualsys report it seems that the attacker would already need access to the device first, to be able to crash the processes and then collect the hashes, so I’d say this vulnerability appears to need chaining with other(s)?