First series of R&M cabling know-how blogs launched

September 2, 2020

Successfully sharing long-standing experience and know-how

BENGALURU, India/Wetzikon, Switzerland – September 2, 2020 – R&M, the global Swiss developer and provider of connectivity systems for high-quality, high-performance network infrastructures, has just completed its first series of blogs covering several cabling-related topics. The blogs, in which the company provides neutral cable know-how as a trusted advisor, have been well received.

R&M can offer a great deal of experience and expertise based on our practical experience and R&D capabilities to help clear up any confusion. We’re more than happy to share this know-how, as this benefits customers and prospects, as well as the network and cabling industry as a whole,” Hermann Christen, Market Manager at R&M.

Read all blogs that have appeared to date

Installed fiber cabling faces a variety of threats – but rodents are one of the greatest threats of all.

https://blog.rdm.com/rodents-the-biggest-threat-to-fiber-access-network-cabling/

Fiber cables are always slightly longer than their protective jackets – when cable shrinkage occurs, issues may arise.

https://blog.rdm.com/fiber-cable-shrinkage/

There are several ways of getting fiber into the premises. Which Last-mile cabling deployment options can you choose from?

https://blog.rdm.com/last-mile-cabling/

Cables and components must remain operational for decades, even in harsh environments. How to ensure chemical resistance without over-specifying or overspending?

https://blog.rdm.com/choosing-chemical-resistant-structured-cabling-systems-the-smart-way/

To accurately rate the fire behavior of installation cables and determine whether they can be used legally and safely in specific projects and regions, you need to measure a number of key parameters. Different standards prescribe different approaches to doing this. Therefore, the question arises: is it possible to compare the results of tests carried out using CPR-requested, IEC, or other methods? Often, documents focus on a single methodology, such as CPR classification, but very few actually try to explain what tests really mean and which relation – if any – exists between the various standards.

https://blog.rdm.com/cable-fire-behavior-an-overview-and-considerations/

Brochures offering additional insights into these topics can be found here.

https://www.rdm.com/sites/Fiber-Optic-Cable

In addition to the Cabling Know-How blogs, R&M are sharing blogs on key technology and market trends. Topics vary from ‘All over IP’ networks and 5G to Edge Data Centre planning. A complete overview of the blogs can be found here.

https://blog.rdm.com/

# # #

About R&M

R&M (Reichle & De-Massari AG) is a leading global producer of future-proof products and systems for communication and data networks. The company’s close collaboration with certified partners results in pioneering connectivity solutions in the sectors LAN, Public and Telecom Networks as well as Data Centers. The Swiss family company stands for innovation, quality, and proximity to customers. More information can be found at www.rdm.com.


Tenable discovers vulnerabilities in the Magento Mass Import plugin

September 2, 2020

Tenable Research has discovered and disclosed two vulnerabilities in the Magento Mass Import (MAGMI) plugin. This plugin was the subject of an FBI flash security alert in May as attackers were actively exploiting CVE-2017-7391 against vulnerable Magento sites.

CVE-2020-5776 is a cross-site request forgery vulnerability in MAGMI for Magento. An attacker could exploit this vulnerability to perform an attack by tricking a Magento Administrator into clicking on a link while they are authenticated to MAGMI. The attacker could hijack the administrator’s sessions, allowing them to execute arbitrary code on the server where MAGMI is hosted.

CVE-2020-5777 is an authentication bypass vulnerability in MAGMI for Magento version 0.7.23 and below due to the presence of a fallback mechanism using default credentials. An attacker could force the database connection to fail due to a database denial of service (DB- DoS) attack, then authenticate to MAGMI using the default credentials.

A patch has been published for CVE-2020-5777 in MAGMI version 0.7.24 on August 30. However, there was still no patch available for CVE-2020-5776.

Here’s a full analysis by Tenable Research.


%d bloggers like this: