About the thread "Cisco Routers Vulnerability"

Dario Ciccarone dciccaro at cisco.com
Mon Apr 13 22:42:01 UTC 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Rashed, NANOG members:

    Hi there. My name is Dario Ciccarone and I work as an Incident
Manager on the Cisco PSIRT - the Product Security Incident Response Team.

    We saw your email to the NANOG list, with the subject "Cisco Routers
Vulnerability". At this time, we're not aware of any attempts to exploit
either a known or previously unknown vulnerability on any Cisco devices
running Cisco IOS, Cisco IOS XE, Cisco IOS XR, Cisco NX-OS or any other
Cisco operating systems.

    We invite you to follow-up with us directly by emailing the PSIRT
alias, or by using any of the mechanisms listed at the following URL:

   
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html#roosfassv

    Thanks,
    Dario

Dario Ciccarone
Incident Manager - CCIE #10395
Product Security Incident Response Team (PSIRT)
Cisco Systems, Inc.
PGP Key ID: 0xBA1AE0F0
http://www.cisco.com/go/psirt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org

iEYEARECAAYFAlUsRjcACgkQjJUYH7oa4PD5WwCcCk0l6bxnLEuBu4q0rwb7CLMU
jXQAnjgvDscnF8hHBhRWB5o8iHALDmsu
=dg/d
-----END PGP SIGNATURE-----




More information about the NANOG mailing list