When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
In other words, they could abuse the flaw to install malware or extract information from theendpoint.
More details about the vulnerabilities can be foundhere.
Let your people use the web freely without risking data and internet security.
Preferred partner (What does this mean?)
There are no mitigations and no workarounds.
The only way to address the flaws is by updating the firmware, Zyxel said.
Some businesses use it for data redundancy systems, too,BleepingComputerexplains.
They are built for high data volumes, it added.
This also makes them a prime target for cybercriminals.