Showing posts with label Insyde. Show all posts
Showing posts with label Insyde. Show all posts

Monday, February 17, 2025

Review – Public ICS Disclosures – Week of 2-8-25 – Part 2

For Part 2 we have 28 additional vendor disclosures from HPE (15), Insyde, Kunbus, Palo Alto Networks (10), and Philips.

Advisories

HPE Advisory #1 - HPE published an advisory that discusses an incorrect execution-assigned permissions vulnerability in their Intel E810 Series Ethernet Controllers.

HPE Advisory #2 - HPE published an advisory that discusses an uncontrolled search path element vulnerability in their Ethernet Adapters.

HPE Advisory #3 - HPE published an advisory that discusses four vulnerabilities in their Unified OSS Console and HPE Unified OSS Assurance Monitoring software.

HPE Advisory #4 - HPE published an advisory that discusses three vulnerabilities in their StoreEasy Servers.

HPE Advisory #5 - HPE published an advisory that discusses three vulnerabilities in their ProLiant DL/ML/XL, Alletra, Edgeline and Synergy Servers.

HPE Advisory #6 - HPE published an advisory that discusses a sequence of processor instructions leads to unexpected behavior vulnerability in their StoreEasy Servers.

HPE Advisory #7 - HPE published an advisory that discusses an improper FMS in hardware logic vulnerability in their HPE StoreEasy Servers.

HPE Advisory #8 - HPE published an advisory that discusses an improper access control vulnerability in their StoreEasy Servers.

HPE Advisory #9 - HPE published an advisory that discusses an execution with unnecessary privileges vulnerability in their SimpliVity AMD Servers.

HPE Advisory #10 - HPE published an advisory that discusses two improper input validation vulnerabilities in their SimpliVity AMD Servers.

HPE Advisory #11 - HPE published an advisory that discusses an improper access control vulnerability in their ProLiant DL/ML, Alletra, Apollo, Edgeline, MicroServer and Synergy Servers.

HPE Advisory #12 - HPE published an advisory that discusses an improper FMS in hardware logic vulnerability in their ProLiant DL/ML, Alletra, Edgeline and Synergy Servers.

HPE Advisory #13 - HPE published an advisory that discusses a sequence of processor instructions leads to unexpected behavior vulnerability in their ProLiant DL/ML, Alletra, Edgeline and Synergy Servers.

HPE Advisory #14 - HPE published an advisory that discusses two improper input validation vulnerabilities in their ProLiant AMD Servers.

HPE Advisory #15 - HPE published an advisory that discusses an execution with unnecessary privileges vulnerability in their ProLiant AMD Servers.

Insyde Advisory - Insyde published an advisory that describes a potential memory leak vulnerability in their InsydeH2O product.

Kunbus Advisory - Incibe-CERT published an advisory that describes two vulnerabilities in the Kunbus Revolution Pi IIoT gateway.

Palo Alto Networks Advisory #1 - PAN published an advisory that describes an improper protection of alternate path vulnerability in their Cortex XDR Broker VM product.

Palo Alto Networks Advisory #2 - PAN published an advisory that discusses 32 vulnerabilities in their PAN-OS product. These are third-party vulnerabilities.

Palo Alto Networks Advisory #3 - PAN published an advisory that describes a configuration issue with their GlobalProtect Clientless VPN product.

Palo Alto Networks Advisory #4 - PAN published an advisory that discusses 20 vulnerabilities in their Prisma Access Browser.

Palo Alto Networks Advisory #5 - PAN published an advisory that discusses an HTTP request/response smuggling vulnerability with a publicly available exploit in their Cortex XDR Broker VM product.

Palo Alto Networks Advisory #6 - PAN published an advisory that describes an improper check for unusual or exceptional condition vulnerability in their Cortex XDR Agent.

Palo Alto Networks Advisory #7 - PAN published an advisory that describes an external control of file name or path vulnerability in their PAN-OS product.

Palo Alto Networks Advisory #8 - PAN published an advisory that describes an OS command injection vulnerability in their PAN-OS OpenConfig Plugin.

Palo Alto Networks Advisory #9 - PAN published an advisory that describes an external control of file name or path vulnerability in their PAN-OS product.

Palo Alto Networks Advisory #10 - PAN published an advisory that describes a missing authentication for critical function vulnerability in their PAN-OS product.

Philips Advisory - Philips published an advisory that discusses the Veeam man-in-the-middle vulnerability (CVE-2025-23114 not CVE-2025-231104 as reported by Philips).

 

For more information on these disclosures, including links to 3rd party advisories, researcher reports and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-2-3aa - subscription required.

Sunday, November 17, 2024

Review – Public ICS Disclosures – Week of 11-9-24 – Part 2

For Part 2 this week we have 40 additional vendor disclosures from HPE (19), Insyde, Meinberg, Milestone, Palo Alto Networks (9), SEL, Schneider (4), Westermo (3), and Zyxel.

Advisories

HPE Advisory #1 - HPE published an advisory that describes an unauthorized file access vulnerability in their Cray Data Virtualization Service (DVS). 

HPE Advisory #2 - HPE published an advisory that describes an unauthorized file access vulnerability in their Cray Data Virtualization Service (DVS).

HPE Advisory #3 - HPE published an advisory that discusses an improper access control vulnerability in their Cray ClusterStor Data Services.

HPE Advisory #4 - HPE published an advisory that discusses nine vulnerabilities in their HP-UX Using OpenSSL.

HPE Advisory #5 - HPE published an advisory that discusses five vulnerabilities in their Unified OSS Console.

HPE Advisory #6 - HPE published an advisory that discusses a privilege escalation vulnerability in their Ethernet Adapters Using Intel Ethernet Adapter Complete Driver Pack.

HPE Advisory #7 - HPE published an advisory that discusses a sensitive information in resource not removed before reuse vulnerability in ProLiant DL/ML, Alletra, Synergy, and Edgeline Servers.

HPE Advisory #8 - HPE published an advisory that discusses an improper FMS in hardware logic vulnerability in their HPE ProLiant DL/ML, Alletra, Synergy, and Edgeline Servers.

HPE Advisory #9 - HPE published an advisory that discusses an insufficient flow control management vulnerability in their ProLiant DL/ML, Alletra, Synergy, and Edgeline Servers.

HPE Advisory #10 - HPE published an advisory that discusses a denial of service vulnerability in their StoreEasy Servers.

HPE Advisory #11 - HPE published an advisory that discusses two vulnerabilities in their HPE StoreEasy servers.

HPE Advisory #12 - HPE published an advisory that discusses two vulnerabilities in their ProLiant DL/ML, Alletra, Synergy, and Edgeline servers.

HPE Advisory #13 - HPE published an advisory that discusses two vulnerabilities in their ProLiant DL/ML, Alletra, Synergy, and Edgeline Servers.

HPE Advisory #14 - HPE published an advisory that discusses five out-of-bounds write vulnerabilities in their HP-UX NTP Software.

HPE Advisory #15 - HPE published an advisory that discusses 10 vulnerabilities (3 have publicly available exploits) in their Telco IP Mediation Application.

HPE Advisory #16 - HPE published an advisory that discusses two vulnerabilities in their StoreEasy Servers.

HPE Advisory #17 - HPE published an advisory that discusses a sensitive information in resource not removed before reuse vulnerability in their StoreEasy Servers.

HPE Advisory #18 - HPE published an advisory that discusses an improper FMS in hardware logic vulnerability in their StoreEasy Servers.

HPE Advisory #19 - HPE published an advisory that discusses the PixieFail vulnerabilities in their Cray Servers.

Insyde Advisory - Insyde published an advisory that describes a factory reset vulnerability in their IHISI function.

Meinberg Advisory - Meinberg published an advisory that describes three vulnerabilities in their Lantime product.

Milestone Advisory - Milestone published an advisory that discusses a clear-text transmission of sensitive information vulnerability in their SQL Client.

Palo Alto Networks Advisory #1 - Palo Alto Networks published an advisory that discusses 20 vulnerabilities in their Prisma Access Browser.

Palo Alto Networks Advisory #2 - Palo Alto Networks published an advisory that describes a cross-site scripting vulnerability in their PAN-OS product.

Palo Alto Networks Advisory #3 - Palo Alto Networks published an advisory that describes a NULL pointer dereference vulnerability in their GlobalProtect Gateway product.

Palo Alto Networks Advisory #4 - Palo Alto Networks published an advisory that describes a NULL pointer dereference vulnerability in multiple firewall products.

Palo Alto Networks Advisory #5 - Palo Alto Networks published an advisory that describes a path traversal vulnerability in multiple Palo Alto Networks products.4

Palo Alto Networks Advisory #6 - Palo Alto Networks published an advisory that describes a server-side request forgery vulnerability in multiple Palo Alto Network products.

Palo Alto Networks Advisory #7 - Palo Alto Networks published an advisory that describes an improper certificate validation vulnerability in multiple Palo Alto Networks products.

Palo Alto Networks Advisory #8 - Palo Alto Networks published an advisory that describes an improper restriction of XML external entity reference vulnerability in multiple Palo Alto Networks products.

Palo Alto Networks Advisory #9 - Palo Alto Networks published an advisory that describes a NULL pointer dereference vulnerability in multiple Palo Alto Networks products.

SEL Advisory - SEL published a new version notice for their SEL-5037 SEL Grid Configurator that describes a security enhancement.

Schneider Advisory #1 - Schneider published an advisory that describes an uncontrolled resource consumption vulnerability in their PowerLogic PM5300 series products.

Schneider Advisory #2 - Schneider published an advisory that describes two vulnerabilities in their Modicon Controllers.

Schneider Advisory #3 - Schneider published an advisory that describes three vulnerabilities in their Modicon Controllers.

Schneider Advisory #4 - Schneider published an advisory that describes a missing authorization vulnerability in their EcoStruxure IT Gateway.

Westermo Advisory #1 - Westermo published an advisory that discusses two vulnerabilities (with publicly available exploit code) in their WEos product.

Westermo Advisory #2 - Westermo published an advisory that describes a stack-based overflow vulnerability in their WEos product.

Westermo Advisory #3 - Westermo published an advisory that discusses two vulnerabilities (one with publicly available exploits) in their WeOS product.

Zyxel Advisory - Zyxel published an advisory that describes two vulnerabilities in their GS1900 series switches.

 

For more information on these disclosures, including links to 3rd party advisories, researcher reports and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-11-96b - subscription required.

Saturday, September 14, 2024

Review – Public ICS Disclosures – Week of 9-7-24 – Part 1

This week we have 25vvendor disclosures from ABB, Eaton, Endress+Hauser, Festo, FortiGuard, HP (2), HPE (7), Insyde, Palo Alto Networks (7), and Phoenix Contact (3).

Advisories

ABB Advisory - ABB published an advisory that discusses two vulnerabilities in their Relion 630 Series Protection Relays.

Eaton Advisory - Eaton published an advisory that describes three vulnerabilities in their Foreseer software.

Endress+Hauser Advisory - CERT-VDE published an advisory that describes a code injection vulnerability in the Endress+Hauser Echo Curve Viewer used in multiple products.

Festo Advisory - CERT-VDE published an advisory that discusses an improper restriction of operations within the bounds of a memory buffer in the Festo Didactic product line.

FortiGuard Advisory #1 - FortiGuard published an advisory that describes an authorization bypass via user controlled keys vulnerability in their FortiAnalyzer and FortiManager products.

FortiGuard Advisory #2 - FortiGuard published an advisory that describes an exposure of sensitive information to an unauthorized actor in their FortiSandbox product.

HP Advisory #1 - HP published an advisory that discusses a use after free vulnerability in their LaserJet and LaserJet Managed Printers.

HP Advisory #2 - HP published an advisory that describes an improper privilege management vulnerability in their Samsung Universal Print Driver for Windows.

HPE Advisory #1 - HPE published an advisory that discusses an information disclosure vulnerability in their HPE StoreEasy Servers.

HPE Advisory #2 - HPE published an advisory that discusses a denial of service vulnerability in their StoreEasy Servers.

HPE Advisory #3 - HPE published an advisory that discusses an information disclosure vulnerability in their ProLiant DL/XL, Synergy, and Edgeline Servers.

HPE Advisory #4 - HPE published an advisory that discusses a denial of service vulnerability in their ProLiant DL/XL, Synergy, and Edgeline Servers.

HPE Advisory #5 - HPE published an advisory that discusses five vulnerabilities in their NonStop Virtual Tape Repository (VTR).

HPE Advisory #6 - HPE published an advisory that discusses a denial of service vulnerability in their HP-UX 11i v3 ONC and NFS Software.

HPE Advisory #7 - HPE published an advisory that discusses a denial of service vulnerability in their HP-UX NFS product.

Insyde Advisory - Insyde published an advisory that discusses a divide by zero vulnerability in their FirmwarePerformancePei module.

Palo Alto Networks Advisory #1 - Palo Alto Networks published an advisory that describes an incorrect authorization vulnerability in their GlobalProtect Portal.

Palo Alto Networks Advisory #2 - Palo Alto Networks published an advisory that describes an expected behavior violation vulnerability in their Cortex XDR Agent.

Palo Alto Networks Advisory #3 - Palo Alto Networks published an advisory that describes a cleartext transmission of sensitive information vulnerability in their ActiveMQ Content Pack.

Palo Alto Networks Advisory #4 - Palo Alto Networks published an advisory that describes an improper neutralization of wildcards and matching symbols vulnerability in their PAN-OS products.

Palo Alto Networks Advisory #5 - Palo Alto Networks published an advisory that describes an exposure of sensitive information to an unauthorized control sphere vulnerability in their PAN-OS products.

Palo Alto Networks Advisory #6 - Palo Alto Networks published an advisory that discusses 29 vulnerabilities (two with known exploits) in their Prisma Access Browser.

Palo Alto Networks Advisory #7 - Palo Alto Networks published an advisory that describes a command injection vulnerability in their PAN-OS products.

Phoenix Contact Advisory #1 - Phoenix Contact published an advisory that describes an allocation of resources without limits or throttling in their mGuard devices.

Phoenix Contact Advisory #2 - Phoenix Contact published an advisory that discusses the regreSSHion  vulnerability in their mGuard products.

Phoenix Contact Advisory #3 - Phoenix Contact published an advisory that describes twelve vulnerabilities in their mGuard products.

 

For more details on these disclosures, including 3rd party advisories and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-9-c5a - subscription required.

Saturday, May 18, 2024

Review – Public ICS Disclosures – Week of 5-11-24 – Part 1

This week we have 28 vendor disclosures from ABB, Aruba, Belden, Bosch, B&R, Dell, Dassault Systèmes, Field Logic, FortiGuard (5), GE Healthcare (2), Hitachi, HP (8), HPE (2), Insyde, and Palo Alto Networks.

Advisories

ABB Advisory - ABB published an advisory that describes two vulnerabilities in their IRC5 / OmniCore RobotWare products.

Aruba Advisory - Aruba published an advisory that describes 18 vulnerabilities in their Access Points product.

Belden Advisory - Belden published an advisory that discusses three vulnerabilities (two with known exploits) in their BAT-C2 and OWL products.

Bosch Advisory - Bosch published an advisory that describes two vulnerabilities in their Praesensa Logging Application, Praesideo Logging Application, and Praesideo PC Call Station.

B&R Advisory - B&R published an advisory that describes an uncontrolled search path element vulnerability in multiple B&R products.

Dell Advisory - Dell published an advisory that discusses an improper access control vulnerability in their Precision Rack products.

Dassault Advisory - Dassault published an advisory that describes a cross-site scripting vulnerability in their 3DDashboard in 3DSwymer product.

Field Logic Advisory - JPCERT published an advisory that describes four vulnerabilities with known exploits in the Field Logic DataCube3 and DataCube4 products.

FortiGuard Advisory #1 - FortiGuard published an advisory that describes a stack-based buffer overflow vulnerability in their FortiOS product.

FortiGuard Advisory #2 - FortiGuard published an advisory that describes a double free vulnerability in their FortiOS product.

FortiGuard Advisory #3 - FortiGuard published an advisory that describes two Use of an externally controlled format string vulnerabilities in their FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager products.

FortiGuard Advisory #4 - FortiGuard published an advisory that describes an improper check of unusual or exceptional conditions vulnerability in their FortiOS product.

FortiGuard Advisory #5 - FortiGuard published an advisory that describes an insufficient verification of data authenticity in their FortiOS and FortiProxy SSL-VPN products.

GE Healthcare Advisory #1 - GE Healthcare published an advisory that describes five vulnerabilities in their EchoPAC Software Only (SWO), EchoPAC TurnKey and ImageVault products.

GE Healthcare Advisory #2 - GE Healthcare published an advisory that describes three vulnerabilities in their Common Service Desktop (CSD) component used in ultrasound devices.

Hitachi Advisory - Hitachi published an advisory that discusses four vulnerabilities in their Developer's Kit for Java products.

HP Advisory #1 - HP published an advisory that discusses an uncontrolled search path element vulnerability in their business desktop and laptop computers.

HP Advisory #2 - HP published an advisory that discusses three vulnerabilities in multiple HP products. These are third-party (Intel) vulnerabilities.

HP Advisory #3 - HP published an advisory that discusses nine vulnerabilities in their desktop computers.

HP Advisory #4 - HP published an advisory that discusses an insecure inherited permissions vulnerability in their Omen notebook PCs.

HP Advisory #5 - HP published an advisory that discusses an improper access control vulnerability in multiple HP product lines.

HP Advisory #6 - HP published an advisory that describes an escalation of privilege vulnerability in multiple HP product lines.

HP Advisory #7 - HP published an advisory that discusses six vulnerabilities in multiple HP product lines. These are third-party (Intel) vulnerabilities.

HP Advisory #8 - HP published an advisory that discusses an improper neutralization of invalid characters in identifiers in web pages vulnerability in multiple HP products lines.

HPE Advisory #1 - HPE published an advisory that discusses OS command inject vulnerability in their SAN Switches.

HPE Advisory #2 - HPE published 39 new (or updated) Security Vulnerability Alerts (background here).

Insyde Advisory - Insyde published an advisory that describes three memory corruption vulnerabilities in their SMM product.

Palo Alto Networks Advisory - Palo Alto Networks published an advisory that discusses the TunnelVision vulnerabilities.

 

For more details about these disclosures, including links to 3rd party advisories, researcher reports and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-5-9bb - subscription required.

Saturday, April 13, 2024

Review - Public ICS Disclosures – Week of 4-6-24 – Part 1

This week for Part 1 we have 20 vendor disclosures from B&R, Broadcom, FortiGuard (3), HP, HPE (3), Insyde, Palo Alto Networks (8), Pepperl+Fuchs, Philips, and Rockwell.

Advisories

B&R Advisory - B&R published an advisory that discusses five vulnerabilities (one with known exploit) in their APROL product.

Broadcom Advisory - Broadcom published an advisory that discusses the XZ Utils Data vulnerability.

FortiGuard Advisory #1 - FortiGuard published an advisory that describes an exposure of sensitive information to unauthorized actor vulnerability in their FortiOS product.

FortiGuard Advisory #2 - FortiGuard published an advisory that describes a use of externally controlled format string vulnerability in their FortiOS product.

FortiGuard Advisory #3 - FortiGuard published an advisory that describes an insufficiently protected credentials vulnerability in their FortiOS and FortiProxy products.

HP Advisory - HP published an advisory that discusses 84 vulnerabilities in their ThinPro products. These are third-party vulnerabilities.

HPE Advisory #1 - HPE published an advisory that describes a cross-site request forgery in their OfficeConnect switches.

HPE Advisory #2 - HPE published an advisory that describes an authentication bypass vulnerability in their FlexFabric and FlexNetwork switches.

HPE Advisory #3 - HPE published an advisory that discusses eleven vulnerabilities {one listed in CISA’s Known Exploited Vulnerabilities (KEV) Catalog} in their Unified Correlation Analyzer.

Insyde Advisory - Insyde published an advisory that describes an out-of-bounds write vulnerability in their PnpSmm application.

Palo Alto Network Advisory #1 - Palo Alto Networks published an advisory that discusses eleven vulnerabilities (one with known exploit) in their PAN-OS product.

Palo Alto Networks Advisory #2 - Palo Alto Networks published an advisory that describes an incorrect authorization vulnerability in their GlobalProtect SSL VPN.

Palo Alto Networks Advisory #3 - Palo Alto Networks published an advisory that describes an inadequate encryption strength vulnerability in their PAN-OS product.

Palo Alto Network Advisory #4 - Palo Alto Networks published an advisory that describes an interpretation conflict vulnerability in PAN-OS product.

Palo Alto Networks Advisory #5 - Palo Alto Networks published an advisory that describes an interpretation conflict vulnerability in their PAN-OS product.

Palo Alto Networks Advisory #6 - Palo Alto Networks published an advisory that describes an allocation of resources without limit or throttling vulnerability in their PAN-OS product.

Palo Alto Networks Advisory #7 - Palo Alto Networks published an advisory that describes a NULL pointer dereference vulnerability in their PAN-OS product.

Palo Alto Networks Advisory #8 - Palo Alto Networks published an advisory that describes an improper ownership management vulnerability in their PAN OS product.

Pepperl+Fuchs Advisory - CERT-VDE published an advisory that discusses eight vulnerabilities (including three with known exploits) in the Pepperl+Fuchs ICES2 and ICES3 products.

Philips Advisory - Philips published an advisory that discusses the Terrapin Attack vulnerability.

Rockwell Advisory - Rockwell published an advisory that describes an invalid header value vulnerability in their ControlLogix and GuardLogix products.

 

For more information on these disclosures, including links to 3rd party advisories, researcher reports, and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-4-3bc - subscription required.

Saturday, March 16, 2024

Review – Public ICS Disclosures – Week of 2-9-24 – Part 1

This week we have 25 vendor disclosures from Bosch (2), FortiGuard (3), Fujitsu, GE Vernova, Hitachi (6), Honeywell, HP (4), Insyde, Korenix, Palo Alto Networks (3), Philips, and Phoenix Contact.

Advisories

Bosch Advisory #1 - Bosch published an advisory that discusses seven vulnerabilities in multiple Bosch products.

Bosch Advisory #2 - Bosch published an advisory that describes five vulnerabilities in their Remote Programing Software.

FortiGuard Advisory #1 - FortiGuard published an advisory that describes an improper authentication vulnerability in their FortiOS products.

FortiGuard Advisory #2 - FortiGuard published an advisory that describes an authentication bypass through user controlled key vulnerability in their FortiOS and FortiProxy products.

FortiGuard Advisory #3 - FortiGuard published an advisory that describes two vulnerabilities in their FortiOS and FortiProxy products.

Fujitsu Advisory - Fujitsu published an advisory that discusses 11 vulnerabilities in multiple Fujitsu products.

GE Vernova Advisory - GE Vernova published an advisory that discusses four vulnerabilities (two listed in CISA’s Known Exploited Vulnerabilities catalog) in multiple products.

Hitachi Advisor #1 - Hitachi published an advisory that discusses an internal state disruption vulnerability in their Cosminexus HTTP Server.

Hitachi Advisory #2 - Hitachi published an advisory that describes an uncontrolled resource consumption vulnerability in their Cosminexus HTTP Server.

Hitachi Advisory #3 - Hitachi published an advisory that discusses an improper input validation vulnerability in their Cosminexus HTTP Server.

Hitachi Advisory #4 - Hitachi published an advisory that discusses the HTTP/2 Rapid Reset Attack (listed on CISA’s KEV catalog) vulnerability in their Cosminexus HTTP Server.

Hitachi Advisory #5 - Hitachi published an advisory that discusses an incomplete cleanup vulnerability in their Cosminexus Component Container.

Hitachi Advisory #6 - Hitachi published an advisory that describes an insertion of sensitive information into log file vulnerability in their Cosminexus Component Container.

Honeywell Advisory - Honeywell published an end-of-life notice for their e S3100 portfolio.

HP Advisory #1 - HP published an advisory that describes a privilege escalation vulnerability in multiple HP computers.

HP Advisory #2 - HP published an advisory that discusses four vulnerabilities in multiple HP computers.

Insyde Advisory - Insyde published an advisory that describes a UEFI variable modification vulnerability in their H2OFFT, H2OUVE, and H2OOAE products.

Korenix Advisory - INCIBE-CERT published an advisory that describes an exposure of sensitive information to an unauthorized actor vulnerability in the Korenix JetI/O 6550 F208 product.

Palo Alto Networks Advisory #1 - Palo Alto Networks published an advisory that describes an improper privilege management vulnerability in their PAN-OS product.

Palo Alto Networks Advisory #2 - Palo Alto Networks published an advisory that describes an improper privilege management vulnerability in their GlobalProtect App.

Palo Alto Networks Advisory #3 - Palo Alto Networks published an advisory that describes an improper privilege management vulnerability in their GlobalProtect App.

Philips Advisory - Philips published an advisory that discusses two use-after-free vulnerabilities in the Imaging Data Commons libdicom.

Phoenix Contact Advisory - Phoenix Contact published an advisory that describes 13 vulnerabilities in their CHARX SEC-3xxx charge controllers.

 

For more information on these advisories, including links to 3rd party advisories, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-2-c78 3-16-24

 - subscription required.

Saturday, January 20, 2024

Review – Public ICS Disclosures – Week of 6-13-24

This week we have 12 vendor disclosures from Broadcom, Dahua, Hitachi (4), HP, HPE, Insyde, SonicWall, Three R Solutions, and VMware. There are two vendor updates from Palo Alto Networks and Synology. We also have two researcher reports that describe vulnerabilities in products from Synology and Korenix.

Advisories

Broadcom Advisory - Broadcom published an advisory that discusses an out-of-bounds write vulnerabilities that is listed in the CISA Known Exploited Vulnerabilities Catalog in multiple Brocade products.

Dahua Advisory - JP-CERT published an advisory that describes an authentication bypass vulnerability in multiple Dahua products.

Hitachi Advisory #1 - Hitachi published an advisory that describes two vulnerabilities in their Device Manager.

Hitachi Advisory #2 - Hitachi published an advisory that discusses an allocation of resources without throttling or limits vulnerability in their Tuning Manager product.

Hitachi Advisory #3 - Hitachi published an advisory that discusses an out-of-bounds write vulnerability in multiple Hitachi products.

Hitachi Advisory #4 - Hitachi published an advisory that describes an incorrect default permissions vulnerability in their Tuning Manager product.

HP Advisory - HP published an advisory that discusses seven vulnerabilities in multiple HP products.

HPE Advisory - HPE published an advisory that discusses eight vulnerabilities in their  HP-UX Apache Web Server products.

Insyde Advisory - Insyde published an advisory that discusses nine vulnerabilities in their EDK2 NetworkPkg IP stack

SonicWall Advisory - SonicWall published an advisory that describes a stack-based buffer overflow vulnerability in their Capture Client and NetExtender Client Windows products.

Three R Solutions Advisory - JP-CERT published an advisory that describes an insufficient technical documentation vulnerability in the Three R Solutions Thermal camera TMC series products.

VMware Advisory - VMware published an advisory that describes a missing access control vulnerability in their Aria Automation products.

Updates

Palo Alto Networks Update - Palo Alto Networks published an update for their Terrapin-Attack vulnerability that was originally published on January 8th, 2024.

Synology Update - Synology published an update for their DiskStation Manager advisory that was originally published on January 9th, 2024.

Researcher Reports

Synology Report - Claroty published a report describing an inadequate data validation vulnerability in the Synology RT6600ax routers.

Korenix Report - CyberDanube published a report describing two vulnerabilities in the Korenix JetNet Series industrial switch.

 

For more information on these disclosures, including links to 3rd party advisories, researcher reports and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-6-7a6 - subscription required. 

Saturday, January 13, 2024

Review – Public ICS Disclosures – Week of 1-6-24 – Part 1

This week we have 12 vendor disclosures from Bosch (2), FortiGuard, GE Gas Power, HPE, Insyde, Palo Alto Networks, SEL, and Splunk (4). We also have three vendor updates from Broadcom, and HP (2). There are three researcher reports for products from X-Rite (2) and Bosch. Finally, we have exploits for products from Advantech and Signalwire.

As is typical for the Saturday after Cyber Tuesday, I will be looking at this week’s advisories and updates from Schneider and Siemens in Part 2.

Advisories

Bosch Advisory #1 - Bosch published an advisory that describes 25 vulnerabilities in their Nexo cordless nutrunner.

Bosch Advisory #2 - Bosch published an advisory that describes an excessive attack surface vulnerability in their BCC Thermostat Product.

FortiGuard Advisory - FortiGuard published an advisory that describes an improper privilege management vulnerability in their FortiOS and FortiProxy products.

GE Gas Power Notice - GE Gas Power published a notice in response to a NERC Section 800 data request to assess the extent of cross-border operation control of Bulk Power System Elements.

HPE Advisory - HPE published an advisory that discusses four vulnerabilities (one of which is listed in CISA’s Known Exploited Vulnerabilities catalog) in their OneView software.

Insyde Advisory - Insyde published an advisory that discusses three vulnerabilities in their UEFI Bios.

Palo Alto Networks Advisory - Palo Alto Networks published an advisory that discusses the Terrapin-Attack vulnerability.

SEL Advisory - SEL announced that the latest version (5.2.0.5) of their SEL-5037 SEL Grid Configurator fixes a cybersecurity vulnerability that could allow an authenticated attacker to execute arbitrary code when the computer starts.

Splunk Advisory #1 - Splunk published an advisory that describes an uncontrolled resource consumption vulnerability in their Splunk Enterprise Security product.

Splunk Advisory #2 - Splunk published an advisory that describes an improper input validation vulnerability in their Enterprise Security product.

Splunk Advisory #3 - Splunk published an advisory that discusses seven vulnerabilities in their Enterprise Security.

Splunk Advisory #4 - Splunk published an advisory that discusses six vulnerabilities in their User Behavior Analytics software.

Updates

Broadcom Update - Broadcom published an update for their Netfilter subsystem advisory that was originally published on November 7th, 2023.

HP Update #1 - HP published an update for their Intel Optane SSD Firmware advisory that was originally published on November 20th, 2023.

HP Update #2 - HP published an update for their Intel Rapid Storage Technology advisory that was originally published on November 20th, 2023.

Researcher Reports

X-Rite Reports - Claroty published two reports describing individual vulnerabilities in the X-Rite MA-T6 Kohinoor spectrophotometer firmware.

Bosch Report - Nozomi Networks published a report discussing nine vulnerabilities in the Bosch Rexroth ctrlX HMI WR21 (rebrand of Advantech TPC-110W HMI).

Exploits

Advantech Exploit - Cody 16 published an exploit for an SQL injection vulnerability in the Advantech Web/SCADA.

Signalwire Exploit - Amirhossein Bahramizadeh published an exploit for a race condition vulnerability in the Signalwire FreeSWITCH.

 

For more details on these disclosures, including links to 3rd Party advisories, researcher reports and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-1-9f7 - subscription required.

Saturday, December 9, 2023

Review – Public ICS Disclosures – Week of 12-2-23

This week we have 37 vendor disclosures from CODESYS, Dell (2), HP, HPE, Insyde, Pilz (3), QNAP (3), SEL (2), Siemens, Tanzu (20), and Wago (2). There are three vendor updates from Atos, CODESYS, and Dell. We have two researcher reports for vulnerabilities in products from Atos and R Radio Network. Finally, we have two exploits for products from FortiGuard and Orpak.

Advisories

CODESYS Advisory - CODESYS published an advisory that describes an OS command injection vulnerability in their Control runtimes running on Linux or QNX operating systems.

Dell Advisory #1 - Dell published an advisory that discusses an out-of-bounds write vulnerability in the ThisOS.

Dell Advisory #2 - Dell published an advisory that discusses 28 vulnerabilities in their Dell Wyse Management Suite.

HP Advisory - HP published an advisory that discusses an improper input validation vulnerability in multiple notebook and desktop computers.

HPE Advisory - HPE published an advisory that describes an information disclosure vulnerability in their HP-UX System Management Homepage.

Insyde Advisory - Insyde published an advisory that discusses an improper input validation vulnerability in multiple kernels

Pilz Advisory #1 - CERT-VDE published an advisory that discusses two vulnerabilities in the Pilz PASvisu and PMI products.

Pilz Advisory #2 - CERT-VDE published an advisory that discusses an out-of-bounds write vulnerability in the Pilz PASvisu, PIT Transponder Manager, and PMI products.

Pilz Advisory #3 - Pilz published an advisory that discusses vulnerabilities in multiple products.

QNAP Advisory #1 - QNAP published an advisory that describes a cross-site scripting vulnerability in their QTS and QuTS hero products.

QNAP Advisory #2 - QNAP published an advisory that describes an OS command injection vulnerability in their legacy VioStor NVR product.

QNAP Advisory #3 - QNAP published an advisory that describes two classic buffer overflow vulnerabilities in their QTS and QuTS hero products.

QNAP Advisory #4 - QNAP published an advisory that discusses five vulnerabilities in their QTS and QuTS hero products.

SEL Advisories - SEL announced new versions of two products that address cybersecurity issues.

Siemens Advisory - Siemens discussed a Black Hat Europe presentation describing the details of the legacy PG/PC and HMI communication protocol as used between TIA Portal / HMIs and SIMATIC S7-1500 SW Controller in versions before V17.

Tanzu Advisories - Tanzu published 20 advisories discussing third-party vulnerabilities in various Tanzu products.

Wago Advisory #1 - CERT-VDE published an advisory that describes an observable discrepancy vulnerability in the Wago Smart Designer product.

Wago Advisory #2 - CERT-VDE published an advisory that describes an improper input validation vulnerability in the Wago Telecontrol Configurator and WagoAppRTU products.

Updates

Atos Update - Atos published an update for their Unify OpenScape advisory that was originally published on October 4th, 2023 and most recently updated on September 10th, 2023.

CODESYS Update - CODESYS published an update for their WIBU CodeMeter Runtime advisory that was originally published on August 17th, 2023 and most recently updated on October 31st, 2023.

Dell Update - Dell published an update for their Rugged Control Center advisory that was originally published on November 30th, 2023.

Researcher Reports

Atos Report - SEC Consult published a report that describes an argument injection vulnerability in the Atos Unify OpenScape products.

R Radio Network Report - Zero Science published a report describing two vulnerabilities in the R Radio Network.

Exploits

FortiGuard Exploit - Cody Sixteen published an exploit for a post authentication CLI crash vulnerability in the FortiWeb VM product.

Orpak Exploit - Parsa Rezaei Khiabanloo published an exploit for a default password vulnerability in the Orpak fueling systems.

 

For more details about these disclosures, including links to researcher reports, 3rd party advisories and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-12-66a - subscription required.

Saturday, November 4, 2023

Review – Public ICS Disclosure – Week of 10-28-23 – Part 1

This week for Part 1 we have 20 vendor disclosures from ABB, Bentley, Cisco (5), CODESYS, Eurotech, GE Grid, Hitachi (2), Hitachi Energy (2), Insyde (3), and Moxa (3).

Part 2 will include a large number of vendor updates.

Advisories

ABB Advisory - ABB published an advisory that discusses 16 vulnerabilities in their COM600 product.

Bentley Advisory - Bentley published an advisory that discusses an out-of-bounds write vulnerability in their Seequent LeapFrog product.

Cisco Advisory #1 - Cisco published an advisory that describes a policy bypass vulnerability in their Snort 3 detection engine.

Cisco Advisory #2 - Cisco published an advisory that describes an SSL/TLS certificate handling vulnerability in their Snort 3 Detection Engine.

Cisco Advisory #3 - Cisco published an advisory that describes a memory allocation vulnerability in their Snort 3 Detection Engine.

Cisco Advisory #4 - Cisco published an advisory that describes a policy bypass vulnerability in their Snort 3 detection engine.

Cisco Advisory #5 - Cisco published an advisory that describes an IP geolocation bypass vulnerability in their Snort 3 detection engine.

CODESYS Advisory - CODESYS published an advisory that discusses a heap-based buffer overflow vulnerability in a variety of CODESYS V2 and V3 products.

Eurotech Advisory - Eurotech published an advisory that discusses an unquoted search path or element vulnerability in a number of Eurotech products.

GE Grid Advisory - GE published an advisory for a vulnerability in their S1 Agile Engineering Tool Suite.

Hitachi Advisory #1 - Hitachi published an advisory that discusses 21 vulnerabilities in their Disk Array Systems products.

Hitachi Advisory #2 - Hitachi published an advisory that discusses three vulnerabilities in their Cosminexus Developer's Kit for Java and Hitachi Developer's Kit for Java.

Hitachi Energy Advisory #1 - Hitachi Energy published an advisory that describes three vulnerabilities in their eSOMS product.

Hitachi Energy Advisory #2 - Hitachi Energy published an advisory that describes two vulnerabilities in their MACH System software product.

Insyde Advisory #1 - Insyde published an advisory that describes a stack-based buffer overflow vulnerability in their AsfSecureBootDxe.

Insyde Advisory #2 - Insyde published an advisory that describes an SMM memory corruption vulnerability in their CsmInt10HookSmm.

Insyde Advisory #3 - Insyde published an advisory that describes an unsanitized arguments in SMI handler vulnerability in their IhisiServicesSmm.

Moxa Advisory #1 - Moxa published an advisory that describes a classic buffer overflow vulnerability in their EDR-810/G902/G903 Series web server.

Moxa Advisory #2 - Moxa published an advisory that describes the use of a broken or risky cryptographic algorithm vulnerability in their NPort 6000 Series products.

Moxa Advisory #3 - Moxa published an advisory that discusses seven vulnerabilities in their PT-G503 Series products.

 

For more information on these advisories, including links to 3rd party advisories and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosure-week-of-10-e57 - subscription required. 

Saturday, October 14, 2023

Review – Public ICS Disclosures – Week of 10-7-23 – Part 1

This week we have 19 vendor disclosures from Cisco, FortiGuard (5), Insyde, Palo Alto Networks (3), Pilz, QNAP (4), Rockwell Automation, Sick, Synology, and Zebra Technologies. There is a vendor update from Cisco. Finally, for Part 1 anyway, we have 22 researcher reports for products from Peplink (4), SoftEther (9), and Yifan (9).

For Part 2 we will have disclosures and updates from Schneider and Siemens and five control system exploits.

Advisories

Cisco Advisory - Cisco published an advisory that discusses the recently announced SOCKS5 handshake vulnerability.

FortiGuard Advisory #1 - FortiGuard published an advisory that describes an access control vulnerability in their FortiOS products.

FortiGuard Advisory #2 - FortiGuard published an advisory that describes an information disclosure vulnerability in their FortiOS products.

FortiGuard Advisory #3 - FortiGuard published an advisory that describes an improper authorization vulnerability in their FortOS products.

FortiGuard Advisory #4 - FortiGuard published an advisory that describes a cross-site scripting vulnerability in their FortiOS products.

FortiGuard Advisory #5 - FortiGuard published an advisory that describes a use after free vulnerability in their FortiOS and FortiProxy products.

Insyde Advisory - Insyde published an advisory that describes an incorrect information reporting vulnerability in their TrEEConfigDriver.

Palo Alto Networks Advisory # 1 - Palo Alto Networks published an advisory that discusses the Rapid Reset vulnerability.

Palo Alto Networks Advisory #2 - Palo Alto Networks published an advisory that describes a clear-text storage of sensitive information vulnerability in their Cortex XSOAR product.

Palo Alto Networks Advisory #3 - Palo Alto Networks published an advisory that discusses the announced SOCKS5 handshake vulnerability.

Pilz Advisory - CERT VDE published an advisory that discusses two vulnerabilities in multiple Pilz products.

QNAP Advisory #1 - QNAP published an advisory that describes three vulnerabilities in their Video Station product.

QNAP Advisory #2 - QNAP published an advisory that describes two vulnerabilities in their QTS, QuTS hero, and QuTScloud products.

QNAP Advisory #3 - QNAP published an advisory that describes a path traversal vulnerability in their QTS, QuTS hero, and QuTScloud products.

QNAP Advisory #4 - QNAP published an advisory that describes an OS command injection vulnerability in their Container Station product.

Rockwell Advisory - Rockwell published an advisory that describes an improper input validation vulnerability in their FactoryTalk Linx product.

Sick Advisory - Sick published an advisory that describes nine vulnerabilities in their Application Processing Unit.

Synology Advisory - Synology published an advisory that discusses the Rapid Reset Vulnerability.

Zebra Advisory - INCIBE CERT published an advisory that describes an authentication bypass using an alternate path or channel in the Zebra  ZTC ZT410-203dpi ZPL printers.

Updates

Cisco Update - Cisco published an update for their Adaptive Security Appliance Software advisory that was originally published on September 6th, 2023, and most recently updated on September 29th, 2023.

Researcher Reports

Peplink Reports - Cisco Talos published four reports about vulnerabilities in the Peplink Surf SOHO HW1 routers.

SoftEther Reports - CISCO Talos published 9 reports on vulnerabilities in the VPN product from SoftEther.

Yifan Reports - Cisco Talos published nine reports about vulnerabilities in the Yifan YF325 industrial cellular router.

 

For more details about these disclosures, including links to 3rd party advisories and researcher reports, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-10-a73 - subscription required.

Saturday, September 16, 2023

Review – Public ICS Disclosures – Week of 9-9-23 – Part 1

For the week of Cyber Tuesday, the number of disclosures is very reasonable. Still, I am doing a two-part post. For Part 1 we have 16 vendor disclosures for DrayTek, FortiGuard, HP, HPE (2), Insyde (2), JTEKT, Palo Alto Networks (2), QNAP (3), Rockwell Automation (2), and Trumpf. There is one vendor update from Broadcom.

For Part 2 I will be looking at advisories and updates from Schneider and Siemens as well as four exploits.

Advisories

DrayTek Advisory - DrayTek published an advisory that describes a format string vulnerability in their Vigor routers.

FortiGuard Advisory - FortiGuard published an advisory that describes a cross-site scripting vulnerability in their FortiProxy and FortiOS products.

HP Advisory - HP published an advisory that discusses two vulnerabilities in multiple products.

HPE Advisory #1 - HPE published an advisory that describes two authentication bypass vulnerabilities in their OneView infrastructure management software.

HPE Advisory #2 - HPE published an advisory that discusses the Downfall Attacks vulnerability.

Insyde Advisory #1 - Insyde published an advisory that discusses four vulnerabilities in their InsydeH2O product.

Insyde Advisory #2 - Insyde published an advisory that describes an arbitrary code execution vulnerability in their SystemFirmwareManagementRuntimeDxe.

JTEKT Advisory - JTEKT published an advisory that describes two vulnerabilities in their Kostac PLC Programming Software.

Palo Alto Networks Advisory #1 - Palo Alto Networks published an advisory that describes an improper handling of exceptional conditions vulnerability in their Cortex XDR Agent.

Palo Alto Networks Advisory #2 - Palo Alto Networks published an advisory that discusses an improper validation of integrity check value vulnerability in their PAN-OS and Prisma products.

QNAP Advisory #1 - QNAP published an advisory that describes an OS command injection vulnerability in their QTS, QuTS hero, and QuTScloud products.

QNAP Advisory #2 - QNAP published an advisory that describes two NULL pointer dereference vulnerabilities in their QTS, QuTS hero, and QuTScloud products.

QNAP Advisory #3 - QNAP published an advisory that describes two out-of-bounds write vulnerabilities in their QTS, QuTS hero and QuTScloud products.

Rockwell Advisory #1 - Rockwell published an advisory that describes an improper input validation vulnerability in their FactoryTalk View Machine Edition product.

Rockwell Advisory #2 - Rockwell published an advisory that discusses four vulnerabilities in their KEPServerEX product.

Trumpf Advisory - CERT-VDE published an advisory that discusses two vulnerabilities in the TRUMPF License Expert.

Updates

Broadcom Update - Broadcom published an update for their use-after-free advisory that was originally published on August 1st, 2023.

 

For more details about these disclosures, including links to researcher reports, 3rd party advisories and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-9-900 - subscription required.

Saturday, July 15, 2023

Review – Public ICS Disclosures – Week of 7-8-23 – Part 1

This week we have 16 vendor disclosures from Aruba Networks, Eaton, Festo, FortiGuard (2), Insyde (3), Moxa (2), Palo Alto Networks, Setelsa, Sick, VMware, and Wireshark (2). We have one vendor update from Moxa. We also have six researcher reports for vulnerabilities in products from VMware (5) and Sante. Finally, we have an exploit for products from Tanzu.

Advisories

Aruba Advisory - Aruba published an advisory that describes nine vulnerabilities in their ArubaOS product.

Eaton Advisory - Eaton published an advisory that reports an undescribed vulnerability in their SMP Gateway automation platform.

Festo Advisory - CERT VDE published an advisory that discusses 200 vulnerabilities in the Festo FactoryViews products.

FortiGuard Advisory #1 - FortiGuard published an advisory that describes a stack-based buffer overflow in their FortiOS and FortiProxy products.

FortiGuard Advisory #2 - FortiGuard published an advisory that describes an insufficient session expiration vulnerability in their FortiOS REST API.

HPE Advisory - HPE published an advisory that describes a privilege escalation vulnerability in their Intelligent Provisioning (IP) for Gen9 product.

Insyde Advisory #1 - Insyde published an advisory that describes an SMI handler vulnerability in their FvbServicesRuntimeDxe.

Insyde Advisory #2 - Insyde published an advisory that reports an update of their Secure Boot dbx.

Insyde Advisory #3 - Insyde published an advisory that discusses a security bypass vulnerability (may be related to the above discussion).

Moxa Advisory #1 - Moxa published an advisory that discusses an uncontrolled recursion vulnerability in some of their switches.

Moxa Advisory #2 - Moxa published an advisory that discusses the PwnKit vulnerability.

Palo Alto Networks Advisory - Palo Alto Networks published an advisory that describes an externally controlled reference to a resource in another sphere vulnerability in their PAN-OS products.

Setelsa Advisory - Incibe CERT published an advisory that describes a relative path traversal vulnerability in the Setelsa ConacWin product.

Sick Advisory - Sick published an advisory that describes eight vulnerabilities in their ICR890-4 track and trace system.

VMware Advisory - VMware published an advisory that describes an authentication bypass vulnerability in their SD-WAN product.

Wireshark Advisory #1 - Wireshark published an advisory that describes a dissector crash vulnerability in their Kafka dissector.

Wireshark Advisory #2 - Wireshark published an advisory that describes a dissector crash vulnerability in their iSCSI dissector.

Updates

Moxa Update - Moxa published an update for their Arm-based computer advisory that was originally published on November 22nd, 2022 and most recently updated on May 29th, 2023.

Researcher Report

VMware Reports - Talos Intelligence published five reports for individual vulnerabilities in the VMware vCenter product.

Sante Report - The Zero Day Initiative published a report that describes a use after free vulnerability in the Sante DICOM view.

Exploits

Tanzu Exploit - GatoGamer1155 published an exploit for a code injection vulnerability in the Tanzu Spring Cloud product.

 

For more details about these disclosures, including links to researcher reports and third-party advisories, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-7-1e8 - subscription required.

Saturday, June 17, 2023

Review – Public ICS Disclosures – Week of 6-10-23 – Part 1

This week we have thirteen vendor disclosures from Carrier, HPE (2), Insyde (3), Palo Alto Networks (3), Phoenix Contact, QNAP, Riello, and VMware. There is also an update from HPE.

In Part 2, I will look at advisories and updates for products from FortiGuard, Schneider and Siemens.

Advisories

Carrier Advisory - Carrier published an advisory that describes an authorization bypass vulnerability in their g MASmobile Classic application.

HPE Advisory #1 - HPE published an advisory that describes a privileged information disclosure vulnerability in their Insight Remote Support (I-RS) product.

HPE Advisory #2 - HPE published an advisory that discusses 19 vulnerabilities in their Integrity MC990 X Server RMC firmware.

Insyde Advisory #1 - Insyde published an advisory that describes a memory leak vulnerability in their CapsuleIFWUSmm driver.

Insyde Advisory #2 - Insyde published an advisory that discusses an empty TPM platform authorization vulnerability.

Insyde Advisory #3 - Insyde published an advisory that describes a security boundary bypass vulnerability in the InsydeH2O UEFI.

Palo Alto Networks Advisory #1 - Palo Alto Networks published an advisory that describes a cross-site scripting vulnerability in their PAN-OS product.

Palo Alto Networks Advisory #2 - Palo Alto Networks published an advisory that describes a privilege escalation vulnerability in their GlobalProtect App.

Palo Alto Networks Advisory #3 - Palo Alto Networks published an advisory that discusses the MOVEit Vulnerabilities.

Phoenix Contact Advisory - Phoenix Contact published an advisory that discusses two vulnerabilities in their FL MGUARD family.

QNAP Advisory - QNAP published an advisory that discusses four vulnerabilities in multiple products.

Riello Advisory - Incibe-CERT published an advisory that describes a CSRF token validation vulnerability in the Riello UPS Netman-204 network adapter.

VMware Advisory - VMware published an advisory that describes an authentication bypass vulnerability in their Tools product.

Updates

HPE Update - HPE published an update for their NonStop servers advisory that was originally published on March 16th, 2023.

 

For more details about these disclosures, including links to third-party advisories and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-6-7ce - subscription required.

 
/* Use this with templates/template-twocol.html */