Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Update Your Kantech Door Controllers Now: Stop Broadcasting Secrets!
View CSAF: Johnson Controls’ Kantech door controllers are broadcasting sensitive info during factory reset. Affected products include KT1, KT2, and KT400. Update firmware to stay secure and follow CISA’s recommendations for minimizing network exposure.
Hot Take:
Who knew door controllers could be so chatty? Looks like Kantech’s KT1, KT2, and KT400 Door Controllers have been broadcasting their secrets like gossiping neighbors until someone decided to put a lock on their lips. Time to update your firmware, folks, and tell those door controllers to zip it!
Key Points:
- Vulnerability in Kantech KT1, KT2, KT400 Door Controllers.
- Exposure of sensitive information during factory reset mode.
- Affected devices: Versions 2.09.01 and prior for KT1 and KT2, and Versions 3.01.16 and prior for KT400.
- Recommended updates: KT1 and KT2 to version 3.10.12, KT400 to version 3.03.
- No known public exploits yet, but better safe than sorry!