For Part 2 we have 20 additional vendor disclosures from Hitachi Energy (3), HPE (2), Moxa, QNAP (4), Rockwell Automation, Sick (2), and Splunk (7). We also have an update from Software Toolbox. Finally, we have an exploit for products from VMware.
Hitachi Energy Advisory #1 - Hitachi Energy published
an
advisory that discusses seven vulnerabilities (six with known exploits) in
their Gateway Station (GWS) Product.
Hitachi Energy Advisory #2 - Hitachi Energy published
an
advisory that discusses seven vulnerabilities (six with known exploits) in
their FACTS Control Platform (FCP) Product.
Hitachi Energy Advisory #3 - Hitachi Energy published
an
advisory that discusses the SpringShell vulnerabilities
in their Lumada APM’s Prognostic Model Executor Service.
HPE Advisory #1 - HPE published an
advisory that discusses an unspecified vulnerability in their HP-UX RPC services
library.
HPE Advisory #2 - HPE published an
advisory that discusses eight vulnerabilities (three with known exploits)
in their B-Series SANnav Management Portal.
Moxa Advisory - Moxa published an
advisory that describes an improper control of generation of code
vulnerability in their MXview product.
QNAP Advisory #1 - QNAP published an advisory
that describes four vulnerabilities in their QTS, QuTS hero, and QuTScloud.
QNAP Advisory #2 - QNAP published an advisory
that describes an improper authentication vulnerability in their Photo Station
product.
QNAP Advisory #3 - QNAP published an advisory
that describes two vulnerabilities in their Video Station product.
QNAP Advisory #4 - QNAP published an advisory
that describes a path traversal vulnerability in their NAS products.
Rockwell Advisory - Rockwell published an
advisory that discusses third-party vulnerabilities in their FactoryTalk®
ProductionCentre.
Sick Advisory #1 - Sick published an advisory that describes
a malformed UDP package vulnerability in their Flexi Soft, Flexi Compact and the
EFI gateway UE4740 products.
Sick Advisory #2 - Sick published an advisory that describes
an uncontrolled resource consumption vulnerability in their Gateway Flexi Soft.
Splunk Advisory #1 - Splunk published an
advisory that describes an error message discloses internal path
vulnerability in their Enterprise product.
Splunk Advisory #2 - Splunk published an
advisory that describes a path traversal vulnerability in their Enterprise
product.
Splunk Advisory #3 - Splunk published an
advisory that describes a reflected cross-site scripting vulnerability in
their Enterprise product.
Splunk Advisory #4 - Splunk published an
advisory that describes a security bypass vulnerability in their Enterprise
product.
Splunk Advisory #5 - Splunk published an advisory
that describes an authentication bypass vulnerability in their Enterprise product.
Splunk Advisory #6 - Splunk published an
advisory that describes a useable discrepancy vulnerability in their
Enterprise product.
Splunk Advisory #7 - Splunk published an
advisory that describes a privilege escalation vulnerability in their
Enterprise Windows product.
Software Toolbox Update - Software Toolbox published
an update for their INCONTROLLER ICS attack tools advisory that was originally
published on April 22nd, 2022.
VMware Exploit - Mr me published a Metasploit module for a
code injection vulnerability in the VMware Workspace ONE Access, Identity
Manager and vRealize Automation products.
For more details on these disclosures, including links to
3rd party advisories and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-4-0b6
- subscription required.
No comments:
Post a Comment