This week for Part 2 we have additional 29 vendor disclosures from Mitsubishi, NI, Palo Alto Networks (11), Panasonic, Pheonix Contact, Rockwell Automation, SEL (3), Schneider (4), Siemens, Supermicro, VMware (2), WatchGuard (2). Part 3 should be published on Tuesday.
Advisories
Mitsubishi Advisory -
Mitsubishi published an
advisory that describes an execution with unnecessary privilege
vulnerability in their GENESIS64 and MC
Works64 products.
NI Advisory - NI
published an
advisory that describes five vulnerabilities in their Circuit Design Suite.
PAN Advisory #1 - PAN published an advisory that
discusses 16 vulnerabilities in their Prisma Access Browser products.
PAN Advisory #2 - PAN published an advisory that
describes an improper check for unusual or exceptional conditions vulnerability
in multiple Palo Alto Networks products.
PAN Advisory #3 - PAN published an advisory that
describes an incorrect privilege assignment vulnerability in their MetaDefender
Endpoint Security SDK product.
PAN Advisory #4 - PAN published an advisory that
describes a missing authentication for critical function vulnerability in their
Cortex XDR Broker VM product.
PAN Advisory #5 - PAN published an advisory that
describes a cross-site scripting vulnerability in multiple Palo Alto Network
products.
PAN Advisory #6 - PAN published an advisory that
describes a code injection vulnerability in their Cortex XDR Broker VM product.
PAN Advisory #7 - PAN published an advisory that
describes an incorrect privilege assignment vulnerability in their
GlobalProtect products.
PAN Advisory #8 - PAN published an advisory that
describes a clear-text transmission of sensitive information vulnerability in multiple
Palo Alto Networks products.
PAN Advisory #9 - PAN published an advisory that
describes an improper neutralization of a script in a web page vulnerability in
their Cloud NFGW and PAN-OS products.
PAN Advisory #10 - PAN published an advisory that
describes an insufficient session expiration vulnerability in their Prisma
Cloud Compute Edition product.
PAN Advisory #11 - PAN published an advisory that
discusses 14 vulnerabilities in their PAN-OS product.
Panasonic Advisory -
JP-CERT published an
advisory that describes a missing protection mechanism for alternate
hardware interface vulnerability in the Panasonic IR Control Hub.
Pheonix Contact Advisory - Pheonix Contact published an
advisory that describes an allocation of resources without limits or
throtting vulnerability in their Bus coupler for Axioline F and Inline
Remote-I/O-system.
Rockwell Advisory - Rockwell published an
advisory that discusses an improper restriction of XML external entity
reference vulnerability in their FactoryTalk Historian-ThingWorx Connection
Server.
SEL Advisory #1 - SEL published a software
update notice that addressed cybersecurity issues for their SEL-5056
Software-Defined Network Flow Controller product.
SEL Advisory #2 - SEL published a software
update notice that addressed cybersecurity issues for their SEL-5030
acSELerator QuickSet Software.
SEL Advisory #3 - SEL published a software
update notice that addressed cybersecurity issues for their Flow Controller
product.
Schneider Advisory #1 - Schneider published an
advisory that describes an externally controlled reference to resource in
another sphere vulnerability in their Modicon Controllers.
Schneider Advisory #2 - Schneider published an
advisory that discusses a classic buffer overflow vulnerability in two of
their Wiser home automation products.
Schneider Advisory #3 - Schneider published an
advisory that discusses a classic buffer overflow vulnerability in PrismaSeT
Active, wireless panel server.
Schneider Advisory #4 - Schneider published an
advisory that discusses a missing authentication for critical function
vulnerability in their Galaxy VS, VL, and VXL products.
Siemens Advisory - Siemens published an
advisory that discusses a missing encryption of sensitive data vulnerability
in their Siveillance Video product.
Supermicro Advisory -
Supermicro published an
advisory that discusses five vulnerabilities (one with publicly available
exploits) in 16 separate Supermicro product lines.
VMware Advisory #1 - Broadcom published an
advisory that describes a cross-site scripting in the VMware Aria
automation product.
VMware Advisory #2 - Broadcom published an
advisory that describes a link following vulnerabilities in the VMware
Tools product.
WatchGuard Advisory #1 - WatchGuard published an
advisory that describes a cross-site scripting vulnerability in their
Firebox product (Fireware OS).
WatchGuard Advisory #2 - WatchGuard published an advisory
that describes a cross-site scripting vulnerability in their Firebox product
(Fireware OS).
For more information on these disclosures, including links
to 3rd party advisories, researcher reports, and exploits, see my article at
CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-5-90e
- subscription required.
No comments:
Post a Comment