cognitive cybersecurity intelligence

News and Analysis

Search

Fax machines can be hacked to breach a network, using only its number

Researchers at Check Point have discovered a vulnerability in the ITU T.30 fax protocol that could be exploited to launch a cyber attack and gain access to a network. Hackers only need a fax number to exploit the flaw, and can then gain remote code execution rights on the device, allowing them to run malicious code and compromise other devices on the network. There are currently no security tools that scan incoming faxes, making prevention of the exploit difficult. Organizations must patch individual fax devices and all-in-one machines to block unauthorized access.

Source: www.healthcareitnews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

What the US Election Means for Drug Pricing

The global medical technology, biotech, and life sciences industries face challenges from economic uncertainty, geopolitical tensions, and evolving regulations. Despite pandemic aftereffects, patent expirations, and