As is our normal practice for security bulletins, we document the existence of any additional defense in depth product behavioral changes, as well as the area of functionality where the change occurred so that customers can assess the impact to their environments. However, providing more detail on internal product changes could serve to aid attackers.
We use cookies to enhance your browsing experience, analyze site traffic, and personalize content. By clicking "Got It!," you consent to our use of cookies.