@harrysintonen@infosec.exchange uh what? That explanation makes it sound worse, not better.
even if it requires that the attacker MITM the connection so PR is high... looking at it, how can they claim a RCE has Low impact to CIA?
@harrysintonen@infosec.exchange uh what? That explanation makes it sound worse, not better.
even if it requires that the attacker MITM the connection so PR is high... looking at it, how can they claim a RCE has Low impact to CIA?
@gnyman@infosec.exchange No kidding? I can only recommend anyone doing research on N-Able to avoid going through their "bug bounty" program. They actively cite the program rules to shut down disclosure, namely I cannot show how trivial the attack is to pull off by using mitmproxy. So there is no way for me to challenge their obviously flawed scoring of the vulnerability.
ref https://infosec.exchange/@harrysintonen/112999715864274188
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!