There are two conditions that need to be present for this to be an issue: Being able to set environment variables, and passing those environment variables into a program that will fork a shell script that uses those environment variables.
None of our services (Broadband Command Center, Address Commander etc.) fork a shell to run a shell script, so the conditions to expose this vulnerability are not present within our products. In other words, our services are not vulnerable.
However, we do strongly recommend that customers contact their OS vendor to obtain an updated version of Bash that fixes this vulnerability, as while our services cannot be used to exploit this vulnerability, there may be other services on the operating system that can.Close
From quickly launching new services, to provisioning, activating, and monitoring those services, we have the solution your network needs.
Free up and efficiently manage the IP resources stranded to your GGSN with centralized DHCP and IP address management solutions.
Learn about the cable, wireless, and wireline industry’s level of preparedness for adopting this new protocol.
The conference for exchanging insight on the latest trends and best practices in the device and service-provisioning field. Returning April 7-9, 2015 in Las Vegas.
CED Magazine: Fearless predictions! Dude, where's my flying car?Published February 13, 2015
Stephane Bourque, President and CEO of Incognito Software has been named a finalist for the Ernst & Young Entrepreneur Of The Year® 2014 Award for British Columbia.