A serious flaw in a firewall operating system allows attackers to remotely execute code without authentication, impacting devices used for secure remote access. The vulnerability persists even after certain configurations are removed if others remain active, requiring careful patching. Updates have been released, and temporary solutions are available to mitigate the risk.
Latest mentioned: 09-18
Earliest mentioned: 09-17