About the thread "Cisco Routers Vulnerability"

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Rashed, NANOG members:

    Hi there. My name is Dario Ciccarone and I work as an Incident
Manager on the Cisco PSIRT - the Product Security Incident Response Team.

    We saw your email to the NANOG list, with the subject "Cisco Routers
Vulnerability". At this time, we're not aware of any attempts to exploit
either a known or previously unknown vulnerability on any Cisco devices
running Cisco IOS, Cisco IOS XE, Cisco IOS XR, Cisco NX-OS or any other
Cisco operating systems.

    We invite you to follow-up with us directly by emailing the PSIRT
alias, or by using any of the mechanisms listed at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html#roosfassv

    Thanks,
    Dario

Dario Ciccarone
Incident Manager - CCIE #10395
Product Security Incident Response Team (PSIRT)
Cisco Systems, Inc.
PGP Key ID: 0xBA1AE0F0
http://www.cisco.com/go/psirt