Saturday, June 14, 2025

Review – Public ICS Disclosures – Week of 6-7-25 – Part 1

We have a moderately busy Cyber Disclosure Week. We have 19 vendor disclosures from AUMA, Bosch, Broadcom (6), FortiGuard (8), Hitachi, HPE, and Meinberg.

Advisories

AUMA Advisory - CERT-VDE published an advisory that describes an observable behavior discrepancy with equivalent products vulnerability in the AUMA AC1.2 and PROFOX actuator controls.

Bosch Advisory - Bosch published an advisory that describes a code injection vulnerability in their REST API of the Telex Remote Dispatch Console Server and the RTS VLink Virtual Matrix Software.

Broadcom Advisory #1 - Broadcom published an advisory that discusses a race condition vulnerability in multiple Broadcom products.

Broadcom Advisory #2 - Broadcom published an advisory that discusses a NULL pointer dereference vulnerability in their Brocade Fabric OS, Brocade SANnav, and Brocade Support Link products.

Broadcom Advisory #3 - Broadcom published an advisory that describes a path traversal vulnerability in multiple Broadcom products.

Broadcom Advisory #4 - Broadcom published an advisory that describes an improper check for unusual or exceptional conditions vulnerability in multiple Broadcom products.

Broadcom Advisory #5 - Broadcom published an advisory that discusses a path traversal vulnerability in their Brocade Fabric OS, Brocade SANnav, and Brocade Support Link products.

Broadcom Advisory #6 - Broadcom published an advisory that discuses a use-after-free vulnerability in their Brocade Fabric OS product.

FortiGuard Advisory #1 - FortiGuard published an advisory that describes an improper restriction of communication channels to intended endpoints vulnerability in their FortiOS product.

FortiGuard Advisory #2 - FortiGuard published an advisory that describes an exposure of sensitive information to an unauthorized actor vulnerability in their FortiOS and FortiSASE products.

FortiGuard Advisory #3 - FortiGuard published an advisory that describes an insufficient session expiration vulnerability in their FortiOS and FortiSASE products.

FortiGuard Advisory #4 - FortiGuard published an advisory that describes an improper privilege management vulnerability in their FortiOS, FortiProxy, and FortiWeb products.

FortiGuard Advisory #5 - FortiGuard published an advisory that describes an authentication bypass using an alternate path or channel vulnerability in their FortiOS and FortiProxy products.

FortiGuard Advisory #6 - FortiGuard published an advisory that describes an incomplete cleanup vulnerability in their FortiOS and FortiProxy products.

FortiGuard Advisory #7 - FortiGuard published an advisory that describes a channel accessible by non-endpoint vulnerability in their FortiOS and FortiProxy products.

FortiGuard Advisory #8 - FortiGuard published an advisory that describes an improper certificate validation vulnerability in their FortiOS and FortiSASE products.

Hitachi Advisory - Hitachi published an advisory that discusses an XML entity expansion vulnerability in their JP1/IT Desktop Management 2 products.

HPE Advisory #1 - HPE published an advisory that discusses an improper control for register interface vulnerability in their ProLiant AMD DL/XL Servers.

HPE Advisory #2 - HPE published an advisory that discusses five vulnerabilities in their SAN Switches. These are third-party (Brocade) vulnerabilities.

HPE Advisory #3 - HPE published an advisory that discusses an out-of-bounds read vulnerability in their DL/ML, MicroServer, Synergy, Apollo, XL and Edgeline Servers.

HPE Advisory #4 - HPE published an advisory that discusses an out-of-bounds vulnerability in their StoreEasy Servers.

HPE Advisory #5 - HPE published an advisory that describes a path traversal vulnerability in their Aruba Networking Private 5G Core product.

Meinberg Advisory - Meinberg published an advisory that discusses four vulnerabilities (two with publicly available exploits) in their Lantime product.

 

For more information on these disclosures, including links to 3rd party advisories, researcher reports, and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-6-33b - subscription required.

No comments:

 
/* Use this with templates/template-twocol.html */