This week we have 16 vendor disclosures from Aruba Networks, Eaton, Festo, FortiGuard (2), Insyde (3), Moxa (2), Palo Alto Networks, Setelsa, Sick, VMware, and Wireshark (2). We have one vendor update from Moxa. We also have six researcher reports for vulnerabilities in products from VMware (5) and Sante. Finally, we have an exploit for products from Tanzu.
Advisories
Aruba Advisory - Aruba published an advisory
that describes nine vulnerabilities in their ArubaOS product.
Eaton Advisory - Eaton published an
advisory that reports an undescribed vulnerability in their SMP Gateway
automation platform.
Festo Advisory - CERT VDE published an advisory that
discusses 200 vulnerabilities in the Festo FactoryViews products.
FortiGuard Advisory #1 - FortiGuard published an advisory that describes
a stack-based buffer overflow in their FortiOS and FortiProxy products.
FortiGuard Advisory #2 - FortiGuard published an advisory that describes
an insufficient session expiration vulnerability in their FortiOS REST API.
HPE Advisory - HPE published an
advisory that describes a privilege escalation vulnerability in their Intelligent
Provisioning (IP) for Gen9 product.
Insyde Advisory #1 - Insyde published an advisory that describes
an SMI handler vulnerability in their FvbServicesRuntimeDxe.
Insyde Advisory #2 - Insyde published an advisory that reports
an update of their Secure Boot dbx.
Insyde Advisory #3 - Insyde published an advisory that discusses
a security bypass vulnerability (may be related to the above discussion).
Moxa Advisory #1 - Moxa published an
advisory that discusses an uncontrolled recursion vulnerability in some of
their switches.
Moxa Advisory #2 - Moxa published an
advisory that discusses the PwnKit vulnerability.
Palo Alto Networks Advisory - Palo Alto Networks
published an advisory
that describes an externally controlled reference to a resource in another
sphere vulnerability in their PAN-OS products.
Setelsa Advisory - Incibe CERT published an
advisory that describes a relative path traversal vulnerability in the
Setelsa ConacWin product.
Sick Advisory - Sick published an advisory
that describes eight vulnerabilities in their ICR890-4 track and trace system.
VMware Advisory - VMware published an advisory
that describes an authentication bypass vulnerability in their SD-WAN product.
Wireshark Advisory #1 - Wireshark published an advisory
that describes a dissector crash vulnerability in their Kafka dissector.
Wireshark Advisory #2 - Wireshark published an advisory that describes a dissector crash vulnerability in their iSCSI dissector.
Updates
Moxa Update - Moxa published an update for their Arm-based computer advisory that was originally published on November 22nd, 2022 and most recently updated on May 29th, 2023.
Researcher Report
VMware Reports - Talos Intelligence published
five reports for individual vulnerabilities in the VMware vCenter product.
Sante Report - The Zero Day Initiative published a report that describes a use after free vulnerability in the Sante DICOM view.
Exploits
Tanzu Exploit - GatoGamer1155 published an exploit for a code
injection vulnerability in the Tanzu Spring Cloud product.
For more details about these disclosures, including links to
researcher reports and third-party advisories, see my article at CFSN Detailed
Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-7-1e8
- subscription required.
No comments:
Post a Comment