This week we have fourteen vendor disclosures from Baxter, Bosch, Endress+Hauser, HP (2), Moxa, Philips, Phoenix Contact (2), SonicWall, Splunk, VMware, and Western Digital (2). We also have five vendor updates from HP (2), Mitsubishi, Spacelabs, and Yokogawa. Finally, we have two researcher reports for vulnerabilities in products from Integrated Control Technology (2).
Baxter Advisory - Baxter published an
advisory discussing the Access:7 vulnerabilities.
Bosch Advisory - Bosch published an
advisory discussing an improper restriction of XML external entity
reference vulnerability in their Fire Monitoring System products.
Endress+Hauser Advisory - CERT VDE published an advisory discussing
an out-of-bounds write vulnerability in a number of Endress+Hauser products.
HP Advisory #1 - HP published an
advisory discussing a denial-of-service/RCE vulnerability in a number of
their corporate printer products.
HP Advisory #2 - HP published an advisory
describing a buffer overflow vulnerability in a number of their corporate
printer products.
Moxa Advisory - Moxa published an
advisory discussing a default password vulnerability in unnamed products.
Philips Advisory - Philips published an advisory
discussing a Windows® IKE Extension vulnerability.
Phoenix Contact Advisory #1 - Phoenix Contact published
an
advisory discussing two vulnerabilities with publicly available exploits in
their PLCnext Technology Toolchain and FL Network Manager products.
Phoenix Contact Advisory #2 - Phoenix Contact
published an
advisory discussing fifteen vulnerabilities with publicly available
exploits in their PROFINET software development kit (SDK).
SonicWall Advisory - SonicWall published an
advisory describing a stack-based buffer overflow vulnerability in their SonicOS.
Splunk Advisory - Splunk published an
advisory describing an out-of-bounds read vulnerability in their Enterprise
products.
Commentary – It seems like Claroty
is going to continue to look at vulnerabilities in the cybertools used by
security researchers. Their first report in this area was on
vulnerabilities in Wireshark products though they did not publicly report
on those vulnerabilities. It seems that the folks developing security tools are
subject to the same software development problems that researchers find in
industrial control systems.
VMware Advisory - VMware published an advisory
describing two vulnerabilities in their Carbon Black App Control.
Western Digital Advisory #1 - Western Digital
published an
advisory discussing an out-of-bounds read/write vulnerability with publicly
available exploits in their My Cloud OS 5 devices.
Western Digital Advisory #2 - Western Digital published
an
advisory discussing seven vulnerabilities (including 1 publicly available
exploit) in their My Cloud products.
HP Update #1 - HP published an
update for their UEFI firmware advisory that was originally published on
February 2nd, 2022.
HP Update #2 - HP published an update for the PC BIOS
advisory that was originally
published on March 8th, 2022.
Mitsubishi Update - Mitsubishi published an
update for their FragAttacks advisory
that was originally
published on September 2nd, 2021.
Spacelabs Update - Spacelabs published an
update for their Access:7 advisory that was originally
published on March 15th, 2021.
Yokogawa Update - Yokogawa published an
update for their license function advisory that was originally
published on January 14th, 2022.
ICT Reports - Zero Science published two reports about vulnerabilities (with
publicly available exploits) in the ICT Protege GX integrated access control,
intrusion detection and building automation solution.
For more details about these disclosures, including links to
3rd party advisories, researcher reports and exploits, see my article at CFSN
Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-3-db0
- subscription required.
No comments:
Post a Comment