- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
Xfinity waited 13 days to patch critical Citrix Bleed 0-day. Now it’s paying the price::Data for almost 36 million customers now in the hands of unknown hackers.
Xfinity waited 13 days to patch critical Citrix Bleed 0-day. Now it’s paying the price::Data for almost 36 million customers now in the hands of unknown hackers.
This is the best summary I could come up with:
Comcast waited 13 days to patch its network against a high-severity vulnerability, a lapse that allowed hackers to make off with password data and other sensitive information belonging to 36 million Xfinity customers.
Exploits disclose session tokens, which the hardware assigns to devices that have already successfully provided login credentials.
The name Citrix Bleed is an allusion to Heartbleed, a different critical information disclosure zero-day that turned the Internet on its head in 2014.
That vulnerability, which resided in the OpenSSL code library, came under mass exploitation and allowed the pilfering of passwords, encryption keys, banking credentials, and all kinds of other sensitive information.
A sweep of the most active ransomware sites didn’t turn up any claims of responsibility for the hack of the Comcast network.
Comcast is requiring Xfinity customers to reset their passwords to protect against the possibility that attackers can crack the stolen hashes.
The original article contains 436 words, the summary contains 147 words. Saved 66%. I’m a bot and I’m open source!