| Website | https://www.cirriustech.co.uk/ |
| https://uk.linkedin.com/in/graham-gold | |
| GitHub | https://github.com/goldjg |
| Ko-Fi | https://ko-fi.com/cirriustech |
| Website | https://www.cirriustech.co.uk/ |
| https://uk.linkedin.com/in/graham-gold | |
| GitHub | https://github.com/goldjg |
| Ko-Fi | https://ko-fi.com/cirriustech |
Is anyone else being sick of vendors dismissing clear reports of security issues as āIntended Behaviourā/āBy Designā and ānot a security issueā?
Iāve even had two claim itās ātheoreticalā or ānot reproducibleā despite screenshots and syntax for a POC tool and advice that there is a private repo for the exploit tool they can be added do.
Lazy triage?
This isnāt aimed at a single vendor. A friend and I have reported one to 4 major vendors who are all vulnerable to the same issue and attack vector and the response from 3/4 so far is as above. Which means that then the other vendor presumably responds in the same way, we will end up disclosing because if we donāt, someone with less scruples/morals will find it and use it anyway - if in fact it has not already been widely used because itās incredibly simple to do and to deceive defences that just arenāt looking at this attack before at all.
RE: https://infosec.exchange/@cirriustech/116327853523673428
Parts 2 and 3 are live now (I was gonna make you wait a week between each post butā¦)