The attack surface exposed by proprietary layer 2 protocols contains hidden bugs that have severe implications to the security of the devices that use them, as well as the networks they belong to. We discovered 5 such zero-day vulnerabilities….

By: Barak Hadad & Ben Seri

Full Abstract & Presentation Materials:–zero-days-18806

Posted by Charlie