The backdoor on Contec CMS8000 patient-monitoring devices could allow an IP address at an unnamed university to remotely download and execute unverified files, according to CISA.

  • HakFoo@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    8
    ·
    1 day ago

    There are valid questions, many of which revolve around how and why it’s used.

    Some systems have brain damaged approaches to diagnostics/logging, license enforcement, or remote service/update systems that create security holes but are not intentionally malicious.

    Security is hard and we should remember Hanlon’s Razor.

    • Benjaben@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 day ago

      I get lots of mileage out of Hanlon’s Razor, and I acknowledge the rampant incompetence that suggests its applicability, but digital security seems like about the least appropriate place to apply this rule of thumb.

      • HakFoo@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        1 day ago

        As someone who has to deal with PCI compliance issues, there’s plenty of noob mistakes, out-of-date thinking and outright “let’s log this data for debugging purposes even though if any regulator found out they’d nuke us from orbit.”