Onno (VK6FLAB)

Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.

#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork

  • 15 Posts
  • 443 Comments
Joined 2 years ago
cake
Cake day: March 4th, 2024

help-circle

  • The Australian government has just emailed the following:

    ASD’s ACSC is aware of targeting of multiple vulnerabilities within Australia impacting Cisco ASA 5500-X Series models, that are running Cisco ASA Software or FTD software:

    CVE-2025-20333 (Critical) – A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device.

    CVE-2025-20363 (Critical) – A vulnerability in the web services of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, remote attacker (Cisco ASA and FTD Software) or authenticated, remote attacker (Cisco IOS, IOS XE, and IOS XR Software) with low user privileges to execute arbitrary code on an affected device.

    CVE-2025-20362 (Medium) – A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that should otherwise be inaccessible without authentication.

    A number of versions of Cisco software releases are affected, including those within the following ranges:

    Cisco ASA Software releases 9.12 to 9.23x and; Cisco FTD Software releases 7.0 to 7.7x.

    Please see

    https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks for specific version details.

    Cisco reports active exploitation of these vulnerabilities has been observed globally.









  • From memory they use Cisco.

    In 2023, apparently Optus attempted to blame them for the default values on the hardware (IIRC the size of the routing table), which several people pointed out was blatantly absurd. Apparently Optus also didn’t follow up with a welfare check of each of the failed calls in their network. Apparently they had to physically visit each affected router across the entire network. They were fined. I’m not aware of any other penalties.

    Now, in 2025, it appears that Optus didn’t follow their own processes, ignored several early customer reports about emergency calls not working, didn’t inform the communications minister, under reported the impact, didn’t inform customers and didn’t make any announcements until it was fixed.

    In 2023 I couldn’t help but wonder if the staff at Optus had ever heard of testing. Today it seems obvious … to me … that they don’t.

    Disclaimer: Note that whilst I’m an ICT professional, I don’t have any direct knowledge of the internals of these incidents and I’m relying on memory of reports and commentary and Wikipedia, I have also never played with Cisco routers, so YMMV. I also note that I haven’t been an Optus customer for about a decade, and my own experience with their ICT systems as a customer over fifteen years or so has been … let’s call it “suboptimal”.









  • Except that in civil discussion with experts, other ideas are what helps people arrive at a solution suitable for them and their situation.

    I’ll also add that I’ve been a Linux user for 25 years and the toxicity you claim in relation to the Linux community is in my experience not evident as a “major reason”, instead I’ve found it to be innovative and flexible with a wide perspective and approach to problem solving.

    Are there dickheads in the Linux community? Yes, just like there are everywhere in society.