Certain devices’ SSH connections can be snooped on, allowing attackers to impersonate the equipment and observe users’ login details and activities. The vulnerability is caused by errors in signature generation.
Certain devices’ SSH connections can be snooped on, allowing attackers to impersonate the equipment and observe users’ login details and activities. The vulnerability is caused by errors in signature generation.