The backdoor on Contec CMS8000 patient-monitoring devices could allow an IP address at an unnamed university to remotely download and execute unverified files, according to CISA.

  • @HakFoo@lemmy.sdf.org
    link
    fedilink
    English
    -42 months ago

    There are valid questions, many of which revolve around how and why it’s used.

    Some systems have brain damaged approaches to diagnostics/logging, license enforcement, or remote service/update systems that create security holes but are not intentionally malicious.

    Security is hard and we should remember Hanlon’s Razor.

    • @Benjaben@lemmy.world
      link
      fedilink
      English
      72 months ago

      I get lots of mileage out of Hanlon’s Razor, and I acknowledge the rampant incompetence that suggests its applicability, but digital security seems like about the least appropriate place to apply this rule of thumb.

      • @HakFoo@lemmy.sdf.org
        link
        fedilink
        English
        52 months ago

        As someone who has to deal with PCI compliance issues, there’s plenty of noob mistakes, out-of-date thinking and outright “let’s log this data for debugging purposes even though if any regulator found out they’d nuke us from orbit.”