Sunday, May 18, 2025

Review – Public ICS Disclosures – Week of 5-10-25 – Part 2

This week for Part 2 we have additional 29 vendor disclosures from Mitsubishi, NI, Palo Alto Networks (11), Panasonic, Pheonix Contact, Rockwell Automation, SEL (3), Schneider (4), Siemens, Supermicro, VMware (2), WatchGuard (2). Part 3 should be published on Tuesday.

Advisories

Mitsubishi Advisory - Mitsubishi published an advisory that describes an execution with unnecessary privilege vulnerability in their  GENESIS64 and MC Works64 products.

NI Advisory - NI published an advisory that describes five vulnerabilities in their Circuit Design Suite.

PAN Advisory #1 - PAN published an advisory that discusses 16 vulnerabilities in their Prisma Access Browser products.

PAN Advisory #2 - PAN published an advisory that describes an improper check for unusual or exceptional conditions vulnerability in multiple Palo Alto Networks products.

PAN Advisory #3 - PAN published an advisory that describes an incorrect privilege assignment vulnerability in their MetaDefender Endpoint Security SDK product.

PAN Advisory #4 - PAN published an advisory that describes a missing authentication for critical function vulnerability in their Cortex XDR Broker VM product.

PAN Advisory #5 - PAN published an advisory that describes a cross-site scripting vulnerability in multiple Palo Alto Network products.

PAN Advisory #6 - PAN published an advisory that describes a code injection vulnerability in their Cortex XDR Broker VM product.

PAN Advisory #7 - PAN published an advisory that describes an incorrect privilege assignment vulnerability in their GlobalProtect products.

PAN Advisory #8 - PAN published an advisory that describes a clear-text transmission of sensitive information vulnerability in multiple Palo Alto Networks products.

PAN Advisory #9 - PAN published an advisory that describes an improper neutralization of a script in a web page vulnerability in their Cloud NFGW and PAN-OS products.

PAN Advisory #10 - PAN published an advisory that describes an insufficient session expiration vulnerability in their Prisma Cloud Compute Edition product.

PAN Advisory #11 - PAN published an advisory that discusses 14 vulnerabilities in their PAN-OS product.

Panasonic Advisory - JP-CERT published an advisory that describes a missing protection mechanism for alternate hardware interface vulnerability in the Panasonic IR Control Hub.

Pheonix Contact Advisory - Pheonix Contact published an advisory that describes an allocation of resources without limits or throtting vulnerability in their Bus coupler for Axioline F and Inline Remote-I/O-system.

Rockwell Advisory - Rockwell published an advisory that discusses an improper restriction of XML external entity reference vulnerability in their FactoryTalk Historian-ThingWorx Connection Server.

SEL Advisory #1 - SEL published a software update notice that addressed cybersecurity issues for their SEL-5056 Software-Defined Network Flow Controller product.

SEL Advisory #2 - SEL published a software update notice that addressed cybersecurity issues for their SEL-5030 acSELerator QuickSet Software.

SEL Advisory #3 - SEL published a software update notice that addressed cybersecurity issues for their Flow Controller product.

Schneider Advisory #1 - Schneider published an advisory that describes an externally controlled reference to resource in another sphere vulnerability in their Modicon Controllers.

Schneider Advisory #2 - Schneider published an advisory that discusses a classic buffer overflow vulnerability in two of their Wiser home automation products.

Schneider Advisory #3 - Schneider published an advisory that discusses a classic buffer overflow vulnerability in PrismaSeT Active, wireless panel server.

Schneider Advisory #4 - Schneider published an advisory that discusses a missing authentication for critical function vulnerability in their Galaxy VS, VL, and VXL products.

Siemens Advisory - Siemens published an advisory that discusses a missing encryption of sensitive data vulnerability in their Siveillance Video product.

Supermicro Advisory - Supermicro published an advisory that discusses five vulnerabilities (one with publicly available exploits) in 16 separate Supermicro product lines.

VMware Advisory #1 - Broadcom published an advisory that describes a cross-site scripting in the VMware Aria automation product.

VMware Advisory #2 - Broadcom published an advisory that describes a link following vulnerabilities in the VMware Tools product.

WatchGuard Advisory #1 - WatchGuard published an advisory that describes a cross-site scripting vulnerability in their Firebox product (Fireware OS).

WatchGuard Advisory #2 - WatchGuard published an advisory that describes a cross-site scripting vulnerability in their Firebox product (Fireware OS).

 

For more information on these disclosures, including links to 3rd party advisories, researcher reports, and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-5-90e - subscription required.

No comments:

 
/* Use this with templates/template-twocol.html */