Headline
CVE-2021-44564: Support | Knowledge Centre | Cyber Security | Klakitech
A security vulnerability originally reported in the SYNC2101 product, and applicable to specific sub-families of SYNC devices, allows an attacker to download the configuration file used in the device and apply a modified configuration file back to the device. The attack requires network access to the SYNC device and knowledge of its IP address. The attack exploits the unsecured communication channel used between the administration tool Easyconnect and the SYNC device (in the affected family of SYNC products).
- Home
- Cyber Security
Advisory – Meltdown and Spectre
Advisory – Command Injection vulnerability
CIP-010 R4 Transient
Advisory – Log4j vulnerability
Cybersecurity Vulnerability Management Policy
Security Gateway Brochure
Security Whitepaper
Report A Security Issue
REPORT A SECURITY ISSUE
Kalkitech encourages you to let us know about a security issue you believe you have identified with any Kalkitech product. If you have not already done so, please review our Cybersecurity Vulnerability Management Policy to learn about reporting and internal procedures we use to evaluate and determine actions and security notifications.
To report a security vulnerability, please send e-mail to [email protected]. This email is monitored by Kalkitech’s Security Response Team (SRT), a designated team that handles detected and reported vulnerabilities. To send us sensitive information, please use the Kalkitech/ASE Security Center PGP Public Key to ensure sensitive data is encrypted when you send it to us (see below).
PLEASE PROVIDE AS MUCH INFORMATION AS POSSIBLE WHEN REPORTING A SECURITY ISSUE, INCLUDING :
- Kalkitech product name and version software
- Detailed description of vulnerability
- Information on known exploits
- Your contact information
KALKITECH/ASE SECURITY CENTER PGP PUBLIC KEY
Use the Public PGP Key below to encrypt data you send to us related to a potential security vulnerability and to verify that security communications sent by Kalkitech/ASE are genuine. A Member of the Kalkitech SRT will review your e-mail and contact you to collaborate on resolving the issue.
Active Date :
Apr 26, 2021
Expiration Date :
Apr 26, 2022
Key ID :
0xF0D01A6D
Key Type :
RSA
Key Size :
4096/4096
Finger Print :
9BC3 6837 C72C 2DA4 0F73 25DE 9D90 DA41 F0D0 1A6D
User ID :
- Brochures
- White Paper
Secure_Substation_Gateway_Brochure
1MB
Security-for-Energy-Whitepaper
2MB
SUBSCRIBE FOR SECURITY UPDATES
For Information about our privacy practices, We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing.
Learn more about mailchimp’s privacy practices here.
Make An Enquiry
Get in touch with us to Know More.
Contact Us