Saturday, July 15, 2023

Review – Public ICS Disclosures – Week of 7-8-23 – Part 1

This week we have 16 vendor disclosures from Aruba Networks, Eaton, Festo, FortiGuard (2), Insyde (3), Moxa (2), Palo Alto Networks, Setelsa, Sick, VMware, and Wireshark (2). We have one vendor update from Moxa. We also have six researcher reports for vulnerabilities in products from VMware (5) and Sante. Finally, we have an exploit for products from Tanzu.

Advisories

Aruba Advisory - Aruba published an advisory that describes nine vulnerabilities in their ArubaOS product.

Eaton Advisory - Eaton published an advisory that reports an undescribed vulnerability in their SMP Gateway automation platform.

Festo Advisory - CERT VDE published an advisory that discusses 200 vulnerabilities in the Festo FactoryViews products.

FortiGuard Advisory #1 - FortiGuard published an advisory that describes a stack-based buffer overflow in their FortiOS and FortiProxy products.

FortiGuard Advisory #2 - FortiGuard published an advisory that describes an insufficient session expiration vulnerability in their FortiOS REST API.

HPE Advisory - HPE published an advisory that describes a privilege escalation vulnerability in their Intelligent Provisioning (IP) for Gen9 product.

Insyde Advisory #1 - Insyde published an advisory that describes an SMI handler vulnerability in their FvbServicesRuntimeDxe.

Insyde Advisory #2 - Insyde published an advisory that reports an update of their Secure Boot dbx.

Insyde Advisory #3 - Insyde published an advisory that discusses a security bypass vulnerability (may be related to the above discussion).

Moxa Advisory #1 - Moxa published an advisory that discusses an uncontrolled recursion vulnerability in some of their switches.

Moxa Advisory #2 - Moxa published an advisory that discusses the PwnKit vulnerability.

Palo Alto Networks Advisory - Palo Alto Networks published an advisory that describes an externally controlled reference to a resource in another sphere vulnerability in their PAN-OS products.

Setelsa Advisory - Incibe CERT published an advisory that describes a relative path traversal vulnerability in the Setelsa ConacWin product.

Sick Advisory - Sick published an advisory that describes eight vulnerabilities in their ICR890-4 track and trace system.

VMware Advisory - VMware published an advisory that describes an authentication bypass vulnerability in their SD-WAN product.

Wireshark Advisory #1 - Wireshark published an advisory that describes a dissector crash vulnerability in their Kafka dissector.

Wireshark Advisory #2 - Wireshark published an advisory that describes a dissector crash vulnerability in their iSCSI dissector.

Updates

Moxa Update - Moxa published an update for their Arm-based computer advisory that was originally published on November 22nd, 2022 and most recently updated on May 29th, 2023.

Researcher Report

VMware Reports - Talos Intelligence published five reports for individual vulnerabilities in the VMware vCenter product.

Sante Report - The Zero Day Initiative published a report that describes a use after free vulnerability in the Sante DICOM view.

Exploits

Tanzu Exploit - GatoGamer1155 published an exploit for a code injection vulnerability in the Tanzu Spring Cloud product.

 

For more details about these disclosures, including links to researcher reports and third-party advisories, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-7-1e8 - subscription required.

No comments:

 
/* Use this with templates/template-twocol.html */