{"id":4042,"date":"2015-12-17T02:56:11","date_gmt":"2015-12-16T18:56:11","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4042"},"modified":"2015-12-17T02:56:24","modified_gmt":"2015-12-16T18:56:24","slug":"critical-remote-root-zero-day-fireeye-appliances","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/12\/critical-remote-root-zero-day-fireeye-appliances\/","title":{"rendered":"Critical Remote Root Zero-Day In FireEye Appliances"},"content":{"rendered":"
So FireEye doesn’t have a particularly good reputation in the security community, it’s generally not handled responsible disclosure well and it’s even taken a security firm (ERNW) to court over a vulnerability disclosure<\/a>.<\/p>\n And now there’s another critical remote root zero-day in FireEye appliances – which is scary, as these are high end devices protecting large corporations and governments from zero-days and they don’t even harden their own devices properly?<\/p>\n <\/p>\n