This week we have 17 vendor disclosures from Broadcom (2), Cisco, GE Vernova, HPE (5), Palo Alto Networks, SEL, SICK, WatchGuard (3), Western Digital, and Zyxel. There are also 3 updates from CODESYS, ELECOM, and HPE. We also have 6 researcher reports for products from ABB (4), Blackberry, and Linear Solutions. Finally, we have 3 exploits for products from BlackNET, Positron, and Texas Instruments.
Advisories
Broadcom Advisory #1 - Broadcom published an
advisory that discusses the Blast-Radius vulnerability.
Broadcom Advisory #2 - Broadcom published version
release notice for their Brocade Fabric OS that lists the previously
disclosed vulnerabilities that are corrected in the latest version.
Cisco Advisory - Cisco published an
advisory that describes an improper access control vulnerability in their Industrial
Ethernet 4000, 4010, and 5000 Series Switches.
GE Vernova Advisory - GE published an
advisory that describes two vulnerabilities in their WorkstationST
products.
HPE Advisory #1 - HPE published an
advisory that discusses the regreSSHion vulnerability
in their HPE Superdome Flex and Superdome Flex 280 servers.
HPE Advisory #2 - HPE published an
advisory that describes three command injection vulnerabilities in their Aruba
Access Points products.
HPE Advisory #3 - HPE published an
advisory that describes a cross-site request forgery vulnerability in their
IceWall Agent products.
HPE Advisory #4 - HPE published an
advisory that discusses a protection mechanism failure vulnerability in
their SimpliVity Servers.
HPE Advisory #5 - HPE published an
advisory that discusses an inconsistent flow control management
vulnerability in their SimpliVity Servers.
Palo Alto Networks Advisory - Palo Alto Networks
published an
advisory that discusses the CUPS
vulnerabilities.
SEL Advisory - SEL published a new
version notice for their SEL-5033 acSELerator RTAC software that describes
a cybersecurity enhancement.
SICK Advisory - SICK published an
advisory that describes a missing authentication for critical function
vulnerability in their MSC800 track and trace controller.
WatchGuard Advisory #1 - WatchGuard published an
advisory that describes an incorrect authorization vulnerability (with
publicly available exploit) in their Authentication Gateway.
WatchGuard Advisory #2 - WatchGuard published an
advisory that describes an incorrect authorization vulnerability (with
publicly available exploit) in their Authentication Gateway.
WatchGuard Advisory #3 - WatchGuard published an
advisory that describes an improper handling of exceptional or unusual
conditions vulnerability (with publicly available exploit) in their Single
Sign-On Client.
Western Digital Advisory - Western Digital published
an advisory that describes an improper restriction of operations within the
bounds of a memory buffer vulnerability in their My Cloud firmware.
Zyxel Advisory - Zyxel published an advisory that describes four improper restriction of operations within the bounds of a memory buffer vulnerabilities in multiple Zyxel products.
Updates
CODESYS Update - CODESYS published an update for
their Control V3 web server advisory that was originally published on August 29th,
2024.
ELECOM Update - JP-CERT published an update for their
ELECOM wireless LAN advisory that was originally published on August 27th,
2024.
HPE Update - HPE published an update for their ProLiant DL/ML/XL, Edgeline, MicroServer and Synergy Servers advisory that was originally published on September 16th, 2024 and most recently updated on September 19th, 2024.
Researcher Reports
ABB Report #1 - Zero Science published a report
that describes a files or directories accessible to external parties
vulnerability (with an associated exploit) in the ABB ASPECT building
management software.
ABB Report #2 - Zero Science published a report
that describes an improper input validation vulnerability (with an associated
exploit) in the ABB ASPECT building management software.
ABB Report #3 - Zero Science published a report
that describes a command injection vulnerability (with an associated exploit) in
the ABB ASPECT Control Engines.
ABB Report #4 - Zero Science published a report
that describes a use of default credentials vulnerability (with an associated
exploit) in the ABB ASPECT system.
Blackberry Report - SEC Consult published a
report that describes an authentication bypass by alternate path or channel
vulnerability in the Blackberry CylanceOPTICS Windows Installer Package.
Linear Solutions Report - SSD published a report that describes a remote code execution vulnerability in the Linear eMerge E3 access control product.
Exploits
BlackNET Exploit - bRpsd published an exploit for a
missing authentication for critical operation vulnerability in the BlackNET
secure transport layer.
Positron Exploit - Indoushka published an
exploit for a cross-site request forgery in the Positron Broadcast Signal
Processor TRA7005.
TI Exploit - crypt0d1v3r published a proof-of-concept
toolkit for a denial of service vulnerability in the TI bluetooth stack.
For more information on these disclosures, including links
to 3rd party advisories, researcher reports and exploits, see my article at CFSN
Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-9-2c2 - subscription required.
No comments:
Post a Comment