Deactivating Endpoint Protection Software In An Unauthorized Manner (Revisited)

Discussion in 'News Aggregator' started by Packet Storm, 28 Sep 2016.

  1. Packet Storm

    Packet Storm Guest

    In this paper, the authors describe how the violation of secure design principles can cause authentication bypass vulnerabilities that were found in current endpoint protection software products of different vendors in 2015. All the discussed security vulnerabilities have been reported to the manufacturers of the affected software products according to our responsible disclosure policy and were publicly disclosed in several SySS security advisories and in a talk at the IT security conference DeepSec 2015.

    Continue reading...
     

Share This Page

Loading...