FAQ | Are Q-SYS devices vulnerable to Udp.c exploitation?
This article explains whether Q-SYS devices are vulnerable to Udp.c exploitation and provides answers for frequently asked questions.
If you are not finding the results you need and still have questions, submit a request using the form below and our Tech Docs team will get right on it. Our goal is to provide the content you need!
Your engagement helps us create the content you need. Click here to review this article.
Table of Contents
No. This exploit requires the 'hacker' to install something on the device being 'hacked' to take advantage of the exploit. This is not allowed on Q-SYS devices, so they are not susceptible to this.