You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We just ran your script on a few boxes that are on the 7.4.x series with VPN enabled, they are all upgraded to 7.4.3 which should close the CVE-2024-21762...but they still show up as vulnerable when I run this script.
Just for kicks I downgraded one of the units to 7.2.7 and the script then would show the unit as "patched".
I have sense of feeling that this is not tested properly on units with the 7.4.x version train, which maybe is an uncommon firmware for most people. Please have a look at this, because I think it paints the wrong picture. 7.4.3 is the latest on that train, and it was released as a fix for the CVE-2024-21762 on 7. February 2024.
The text was updated successfully, but these errors were encountered:
Hello,
We just ran your script on a few boxes that are on the 7.4.x series with VPN enabled, they are all upgraded to 7.4.3 which should close the CVE-2024-21762...but they still show up as vulnerable when I run this script.
Just for kicks I downgraded one of the units to 7.2.7 and the script then would show the unit as "patched".
I have sense of feeling that this is not tested properly on units with the 7.4.x version train, which maybe is an uncommon firmware for most people. Please have a look at this, because I think it paints the wrong picture. 7.4.3 is the latest on that train, and it was released as a fix for the CVE-2024-21762 on 7. February 2024.
The text was updated successfully, but these errors were encountered: