You would be shocked how much "old/abandoned" hardware is in production use all over the world in very sensitive places.
Archive: https://archive.today/ArovL
From the post:
>We successfully exploited two discontinued network devices at DistrictCon’s inaugural Junkyard competition in February, winning runner-up for Most Innovative Exploitation Technique. Our exploit chains demonstrate why end-of-life (EOL) hardware poses persistent security risks: when manufacturers stop releasing updates, unpatched vulnerabilities remain frozen in time like fossils, creating perfect targets for attackers.
You would be shocked how much "old/abandoned" hardware is in production use all over the world in very sensitive places.
Archive: https://archive.today/ArovL
From the post:
>>We successfully exploited two discontinued network devices at DistrictCon’s inaugural Junkyard competition in February, winning runner-up for Most Innovative Exploitation Technique. Our exploit chains demonstrate why end-of-life (EOL) hardware poses persistent security risks: when manufacturers stop releasing updates, unpatched vulnerabilities remain frozen in time like fossils, creating perfect targets for attackers.
(post is archived)