▲ | sidewndr46 4 days ago | ||||||||||||||||||||||
I find the EOL aspect of this discussion out of place. These devices shipped like this. They didn't gain these vulnerabilities due to aging or something like that. You can have a device that is 100% supported by everyone from the chip vendor, board assembler, and an OEM that is still trivially vulnerable. | |||||||||||||||||||||||
▲ | Hilift 4 days ago | parent | next [-] | ||||||||||||||||||||||
It's probably relevant due to companies usually dump EOL hardware, and some of it gets a new life in a non-business environment. But if it needs a firmware update for a security vulnerability you're out of luck. There is legitimate commercial market for used EOL hardware as parts for people that keep old hardware a bit longer, but that's probably short term until it can be replaced. | |||||||||||||||||||||||
| |||||||||||||||||||||||
▲ | nickpsecurity 4 days ago | parent | prev | next [-] | ||||||||||||||||||||||
The differences are vulnerability disclosure, vulnerability class, and patch availability. The device is most-vulnerable between the moment common hackers know how to exploit it and when a patch (or mitigation) for that vulnerability is applied. Older hardware has had longer for vulnerabilities to be found. Some might not mitigate new classes of vulnerabilities. The EOL hardware will not receive patches for any vulnerabilities. So, they're at higher risk of attack. From there, the attack will be either malicious input to that machine over the network or a file that embeds an attack. Many problems can be mitigated by running secure software, esp for input validation, on that hardware. One might also use them offline or on trusted networks with software that's hand-chosen for them. (That's what I do.) | |||||||||||||||||||||||
▲ | swinglock 4 days ago | parent | prev | next [-] | ||||||||||||||||||||||
My thought too. They are not insecure because they won't be patched, they are just insecure. Even if patched, what's to say there are not 99 other vulnerabilities lurking, even in their supported products? | |||||||||||||||||||||||
| |||||||||||||||||||||||
▲ | yjftsjthsd-h 4 days ago | parent | prev [-] | ||||||||||||||||||||||
If it's supported, then as soon as somebody finds a vulnerability (and notifies the vendor) it should get fixed. | |||||||||||||||||||||||
|