[179437] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

About the thread "Cisco Routers Vulnerability"

daemon@ATHENA.MIT.EDU (Dario Ciccarone)
Mon Apr 13 19:00:41 2015

X-Original-To: nanog@nanog.org
Date: Mon, 13 Apr 2015 18:42:01 -0400
From: Dario Ciccarone <dciccaro@cisco.com>
To: rali.ahmed@gmail.com, nanog@nanog.org
Errors-To: nanog-bounces@nanog.org


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Rashed, NANOG members:

    Hi there. My name is Dario Ciccarone and I work as an Incident
Manager on the Cisco PSIRT - the Product Security Incident Response Team.=


    We saw your email to the NANOG list, with the subject "Cisco Routers
Vulnerability". At this time, we're not aware of any attempts to exploit
either a known or previously unknown vulnerability on any Cisco devices
running Cisco IOS, Cisco IOS XE, Cisco IOS XR, Cisco NX-OS or any other
Cisco operating systems.

    We invite you to follow-up with us directly by emailing the PSIRT
alias, or by using any of the mechanisms listed at the following URL:

  =20
http://www.cisco.com/web/about/security/psirt/security_vulnerability_poli=
cy.html#roosfassv

    Thanks,
    Dario

Dario Ciccarone
Incident Manager - CCIE #10395
Product Security Incident Response Team (PSIRT)
Cisco Systems, Inc.
PGP Key ID: 0xBA1AE0F0
http://www.cisco.com/go/psirt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org

iEYEARECAAYFAlUsRjcACgkQjJUYH7oa4PD5WwCcCk0l6bxnLEuBu4q0rwb7CLMU
jXQAnjgvDscnF8hHBhRWB5o8iHALDmsu
=3Ddg/d
-----END PGP SIGNATURE-----


home help back first fref pref prev next nref lref last post