Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

To take advantage of these vulnerabilities, an attacker must be able to run code on an affected device. While the underlying CPU and/or operating systems may be affected by these vulnerabilities, our SBC device is a closed system that under normal circumstances does not allow customers to run custom code. As a result, if customers are following our recommended deployment procedure (as outlined in IP Firewall Security), they should not be vulnerable to this issue.

...