![]() ![]() They waited until we fixed the problem before publishing their findings to ensure that no VPN users were exposed to any additional risk.” “When they discovered the CVE vulnerability in our and other VPN providers’ systems, Talos Intelligence, like all ethical security research firms, approached us with the news first before publishing it. When it did, it was completely undocumented and quite possibly unknown to anyone in the world,” NordVPN said on its blog. “The vulnerability described in their report no longer exists on our systems. ![]() Fortunately, those bugs were patched out well before the general public was made aware of them. That April fix had its own flaw in it, according to ZDNet, which made it possible for a theoretical attacker to take control of the user’s system by exploiting the design of both NordVPN and ProtonVPN’s clients. ![]() The flaws in question piggybacked a patch applied by both companies to a bug discovered earlier this year. It turns out that the respective flaws were patched out weeks ago, back when no one had heard anything about them. Fitbit Versa 3įollowing the announcement from Cisco Talos that both NordVPN and ProtonVPN’s internet traffic obfuscating services were vulnerable to a newly discovered bug, both companies have come out with statements of their own to calm the fears of their users. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |