This is a relatively busy disclosure week for the week of Cyber
Tuesday. We have 43 bulk vendor disclosures from FortiGuard (6), Hitachi (8), HP
(8), HPE (14), QNAP (7). We also have 10 bulk updates from Siemens (10). There
are also seven other vendor disclosures from Bosch, Meinberg, Pheonix Contact, Schneider
(2), and Siemens (2).
Bulk Disclosures – FortiGuard
• Firewall policy bypass in
FSSO Terminal Services Agent,
• Format String
Vulnerability in CAPWAP fast-failover mode,
• LDAP authentication
bypass in Agentless VPN and FSSO,
• Request smuggling attack
in FortiOS GUI,
• SSL-VPN Symlink
Persistence Patch Bypass, and
• XSS via back button.
Bulk Disclosures –
Hitachi
• Multiple
Vulnerabilities in Cosminexus HTTP Server,
• Vulnerability
in Cosminexus HTTP Server,
• Vulnerability
in Cosminexus HTTP Server and Hitachi Web Server,
• Multiple
Vulnerabilities in Cosminexus HTTP Server and Hitachi Web Server,
• Multiple
Vulnerabilities in Cosminexus,
• Multiple
Vulnerabilities in JP1,
• Multiple
Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi
Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops
Center, and
• Multiple
Vulnerabilities in Hitachi Command Suite products
Bulk Disclosures – HP
• HP App –
Potential Cross-Site Scripting,
• AMD
Graphics Driver February 2026 Security Update,
• AMD
Processors February 2026 Security Update,
• Certain
HP OfficeJet Pro Printers – Denial of Service,
• Intel
Chipset Firmware February 2026 Security Update,
• Intel
Processor Firmware February 2026 Security Update,
• Certain HP
OfficeJet Pro Printers - Information Disclosure, and
• Intel
Graphics Software February 2026 Security Update.
Bulk Disclosures – HPE
• Certain
HPE ProLiant Servers Using Certain Intel Processor BIOS, INTEL-SA-01406, Intel
Quick Assist Technology (Intel QAT) Advisory, Multiple vulnerabilities,
• Certain
HPE SimpliVity Servers Using Certain Intel Processors, INTEL-SA-01313, 2025.3
IPU, Intel Xeon Processor Firmware Advisory, Multiple Vulnerabilities,
• Certain
HPE SimpliVity Servers Using Certain Intel Processors, INTEL-SA-01280, 2025.3
IPU, Intel Chipset Firmware Advisory, Multiple Vulnerabilities,
• Certain
HPE SimpliVity Servers Using Certain Intel Processors, INTEL-SA-01312, Intel
TDX Module Advisory, Multiple Vulnerabilities,
• Certain
HPE StoreEasy Servers Using Certain Intel Processors, INTEL-SA-01396, 2026.1
IPU, Intel Processor Firmware Advisory, Local Escalation of Privilege
Vulnerability,
• Certain
HPE ProLiant DL/ML/XD, Synergy, Edgeline and Alletra Servers Using Certain
Intel Processors, INTEL-SA-01314, 2025.4 IPU, Intel TDX Module Advisory, Local
Escalation of Privilege Vulnerability,
• Certain
HPE ProLiant DL/ML/XD, Synergy, Edgeline, and Alletra Servers Using Certain
Intel •
Processors, INTEL-SA-01397, 2026.1 IPU, Intel Trust Domain Extensions
(Intel TDX) module Advisory, Multiple Vulnerabilities,
• Certain
HPE ProLiant DL/ML/XD, Synergy, and Alletra Servers Using Certain Intel
Processors, INTEL-SA-01401, UPLR1 - Intel Server Firmware Advisory, Local
Denial of Service Vulnerability,
• HPE
Aruba Networking EdgeConnect SD-WAN Orchestrator, Multiple Vulnerabilities,
• Certain
HPE ProLiant AMD DL/XL Servers Using Certain AMD EPYC Processors,
AMD-SB-3023:AMD Server Vulnerabilities, Multiple Vulnerabilities,
• HPE
Intel E810 Series Ethernet Controllers, INTEL-SA-01171, Intel Ethernet Adapters
800 Series Advisory, Denial of Service Vulnerability,
• Certain
HPE StoreEasy Servers Using Certain Intel Processors, INTEL-SA-01314, 2025.4
IPU, Intel TDX Module Advisory, Local Escalation of Privilege Vulnerability,
• Certain
HPE StoreEasy Servers Using Certain Intel Processors, INTEL-SA-01397, 2026.1
IPU, Intel Trust Domain Extensions (Intel TDX) module Advisory, Multiple
Vulnerabilities, and
• Multiple
Vulnerabilities in HPE Aruba Networking Private 5G Core.
Bulk Disclosures – QNAP
• Multiple
Vulnerabilities in Media Streaming add-on,
• Multiple
Vulnerabilities in Qsync Central,
• Multiple
Vulnerabilities in File Station 5,
• Vulnerabilities
in Apache,
• Multiple
Vulnerabilities in QTS and QuTS hero,
• Multiple
Vulnerabilities in QuTS hero, and
• Vulnerabilities
in Samba.
Bulk Updates – Siemens
• Multiple Vulnerabilities in Third-Party Components in SINEC OS
before V3.1,
• Multiple Vulnerabilities in Third-Party Components in SINEC OS
before V3.2,
• Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808
Devices,
• Denial-of-Service Vulnerability in ET 200 Devices,
• Multiple Vulnerabilities in SiPass integrated,
• Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on
RUGGEDCOM APE1808 Devices,
• DLL Hijacking Vulnerability in Siemens Web Installer used by
the Online Software Delivery,
• Vulnerabilities in the additional GNU/Linux subsystem of the
SIMATIC S7-1500 TM MFP V1.1,
• Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet
PCs, and SIMATIC Field PGs, and
• Vulnerabilities in the additional GNU/Linux subsystem of the
SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5.
Advisories
Bosch Advisory - Bosch published an advisory that describes
four deserialization of untrusted data vulnerabilities in their Rexroth
IndraWorks product.
Meinberg Advisory -
Meinberg published an
advisory that discusses 21 vulnerabilities in their LANTIME product.
Pheonix Contact
Advisory - Pheonix Contact published an
advisory that discusses an improperly controlled sequential memory
allocation vulnerability in their mGuard products.
Schneider Advisory #1 - Schneider published an
advisory that describes an improper check for unusual or exceptional
conditions vulnerability in their SCADAPack and Remote Connect products.
Schneider Advisory #2 - Schneider published an
advisory that describes two vulnerabilities in their EcoStruxureTM Building
Operation Workstation and EcoStruxureTM Building Operation Webstation products.
Siemens Advisory #1 - Siemens published an
advisory that describes six vulnerabilities in their Simcenter Femap and
Nastran products.
Siemens Advisory #2 - Siemens published a
bulletin that describes an absence of anti-tamper protections and modern
exploit mitigation controls in the SIPORT Desktop Client Application.
For more information on these disclosures, including links
to 3rd party advisories, and researcher reports, see my article at
CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-2-fdd
- subscription required.