BOOK THIS SPACE FOR AD
ARTICLE AD14. June 2021
This article has been indexed from Help Net Security
Several egregious vulnerabilities affecting the Stem Audio Table conference room speakerphone could be exploited by attackers to eavesdrop on what’s being discussed in its proximity, download malicious firmware, achieve and maintain network persistence, and more, GRIMM researchers have discovered. The vulnerabilities in the Stem Audio Table conference room speakerphone The CVE numbers are yet to be assigned, but the found vulnerabilities include: Stack buffer overflow and command injection flaws that could allow attackers to execute … More →
The post How a conference room speakerphone might let attackers into your company network appeared first on Help Net Security.