My customer is impacted by this vulnerability. They have around 300+ ISR4K device. I have couple of questions.
I hope the attacker needs a console access or physical access to the device to trigger the vulnerability? Please confirm the same.Instead...