This week we have five PrintNightmare disclosures from Boston Scientific, Carestream, PEPPERL+FUCHS, Draeger, and Spacelabs Healthcare. There were four other vendor disclosures from CODESYS. We also have two updates from CODESYS.
PrintNightmare Advisories
Boston Scientific published an
advisory discussing the PrintNightmare vulnerabilities.
Carestream published an
advisory discussing the PrintNightmare vulnerabilities.
CERT-VDE published an advisory
discussing the PrintNightmare vulnerabilities in products from PEPPERL+FUCHS.
Draeger published an
advisory discussing the PrintNightmare vulnerabilities.
Spacelabs published an advisory discussing the PrintNightmare vulnerabilities.
Other Disclosures
CODESYS published an
advisory describing a files or directories accessible to external parties
vulnerability in their CODESYS V3 web server.
CODESYS published an
advisory describing a null pointer dereference vulnerability in their CODESYS
Gateway V3.
CODESYS published an
advisory describing seven vulnerabilities in their CODESYS Development
System V3.
CODESYS published an
advisory describing a null pointer dereference vulnerability in their CODESYS
EtherNetIP.
CODESYS published an
update for their CODESYS V3 web server advisory that originally
published on May 19th, 2021.
CODESYS published an update for their CODESYS V3 Runtime Toolkit for VxWorks advisory that was originally published on May 19th, 2021.
For more details on these advisories and updates, including
links to proof-of-concept code, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-28e
- subscription required.
No comments:
Post a Comment