RAD SecFlow-2 Vulnerability: Path Traversal Exploit Hits Critical Infrastructure

RAD SecFlow-2 devices are vulnerable to path traversal attacks, allowing attackers to access sensitive files. With a CVSS v4 score of 8.7, this flaw poses a serious remote threat. RAD recommends upgrading to SecFlow-1p and following CISA’s cybersecurity measures for protection.

Hot Take:

Well, SecFlow-2 sure knows how to make an exit! With a vulnerability that practically leaves the door open for hackers, it’s no wonder RAD Data Communications is recommending an upgrade. Out with the old and easily exploitable, in with the new and secure – at least, we hope.

Key Points:

  • Vulnerability: Path Traversal in SecFlow-2 with CVSS v4 score of 8.7
  • Attack Complexity: Low, with available public exploits
  • Affected Product: RAD Data Communications SecFlow-2, all versions
  • Potential Impact: Obtain files from the operating system
  • Mitigation: Upgrade to SecFlow-1p and follow CISA recommendations

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here