![]() ![]() ![]() If you have any questions or concerns, please do not hesitate to contact our support team. We take the security of our products very seriously and apologize for any inconvenience this may cause. Our development team has already developed a patch for this vulnerability and we strongly recommend that you apply the update as soon as possible to ensure the security of your device. Please see our knowledge-based article for the patch releases related to this vulnerability. Digi has found that it is appropriate to patch the vulnerability. Learn More Ripple20 Public Disclosureĭigi International has recently become aware that CVE-2020-11901 is still impacting our NDS and NET+OS product lines, which were part of Ripple20 vulnerabilities. Included is a table of Digi International products that were reported as vulnerable by Dragos. These are CVEs that Dragos reported to us, Digi International. ![]() The attached document includes vulnerability findings from a report that Dragos submitted. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |