Vulnerability Details
The Computer Network Defence Alert State is designed to give a granular and more dynamic visualisation of the current cyber security threat. Any increase in an alert state will occur immediately an issue is detected and it will drop again by one level each working day.
Our rationale for this agility is that vulnerabilities often occur in clusters, therefore reducing the alert state again quickly, will increase your visibility of new threats to the same product. Daily reductions in alert state occur at approximately 1900 GMT/UTC. Significant vulnerabilities may remain for longer. Vulnerabilities on this page are predominantly remotely executable, very few local server exploits will be shown.
Friday 03 May 2024
CyberPower
Patch
Power Panel has been updated to fix several security vulnerabilities, included hard-coded credentials. Highest CVSSv3 score of 9.8
More info.
PcVue
Patch
A vulnerability has been identified in the TMW IEC 61850 Client libraries resulting from specially crafted MMS messages. This buffer overflow can cause a crash resulting in a DoS. CVSSv3 score of 8.2
More info.
Microsoft
Patch
Microsoft has updated Edge to include the latest chromium updates.
More info.
IBM
Patch
NetApp
New
NetApp has published 12 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 7.8
No patches yet.
More info.
Thursday 02 May 2024
Dropbox
Exploit
Dropbox has reported an incident in their Dropbox Sign product that exposed customer information as well as customers simply signing a document.
More info.
Cisco
Patch
Multiple vulnerabilities in Cisco IP Phone firmware could allow a remote attacker to cause a DoS, gain unauthorized access, or view sensitive information on an affected system. CVSSv3 score of 7.5
More info.
SonicWall
Patch
SonicWall GMS contains security vulnerabilities, including use of a hardcoded password. Highest CVSSv3 score of 7.5
More info.
Tinyproxy
New
IBM
Patch
Multiple security vulnerabilities are addressed with IBM Cloud Pak for Business Automation. Highest CVSSv3 score of 9.8
More info.
IBM Controller has addressed multiple vulnerabilities. Highest CVSSv3 score of 9.8
More info.
IBM QRadar SIEM on Azure Cloud deployed from Azure Marketplace is vulnerable to a remote code execution issue found within the Microsoft Open Management Infrastructure (OMI). CVSSv3 score of 9.8
More info.
HashiCorp
Patch
Vault Enterprise leaks sensitive HTTP request headers in audit log when deployed with a Performance Standby node.
More info.
Wednesday 01 May 2024
Patch
Google has updated Chrome for Desktop to fix 2 security vulnerabilities.
More info.
IBM
Patch
Multiple security vulnerabilities have been fixed in IBM Business Automation Manager Open Editions. Highest CVSSv3 score of 9.1
More info.
Vulnerabilities in OpenSSH and the edge Linux Kernel affect IBM Storage Copy Data Management. Highest CVSSv3 score of 9.8
More info.
A vulnerability in Linux Kernel affects IBM Storage Copy Data Management. CVSSv3 score of 9.8
More info.
IBM Watson Discovery for IBM Cloud Pak for Data is affected by a vulnerability in PostgreSQL. CVSSv3 score of 10.
More info.
Dell
Patch
HPE
Patch
Security vulnerabilities have been identified in Hewlett Packard Enterprise OneView Software that can be exploited by a remote attacker to bypass Web Application Firewall (WAF) and cause a DoS. CVSSv3 score of 7.5
More info.
Aruba
Patch
Linux
Patch
Tuesday 30 April 2024
Monday 29 April 2024
Belden
Patch
A vulnerability in the HTTP(S) management module of HiEOS devices could allow a remote attacker to bypass authentication for web server resources. CVSSv3 score of 9.8
More info.
Microsoft
Patch
Microsoft has updated Edge to include the latest chromium vulnerability fixes.
More info.
IBM
Patch
Multiple security vulnerabilities have been addressed in IBM Security Verify Governance - Containerized Identity Manager. Highest CVSSv3 score of 9.8
More info.
IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to SQL injection in PostgreSQL JDBC Driver. CVSSv3 score of 10.
More info.
IBM Administration Runtime Expert for i is vulnerable to attacker executing arbitrary code on the system due to Dojo. CVSSv3 score of 9.8
More info.
Multiple vulnerabilities were addressed in IBM Cloud Pak for AIOps. Highest CVSSv3 score of 9.8
More info.
IBM Cloud Pak for Network Automation addresses multiple security vulnerabilities. Highest CVSSv3 score of 9.
More info.
Friday 26 April 2024
Honeywell
Patch
Experion PKS, Experion LX, PlantCruise by Experion, Safety Manager, Safety Manager SC contain security vulnerabilities that could disclose sensitive information, allow privilege escalation, or allow remote code execution. Highest CVSSv4 score of 9.2
More info.
Secomea
Patch
A classic buffer overflow vulnerability in GateManager allows a DoS.
More info.
NetApp
New
NetApp has published 15 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 7.5
No patches yet.
More info.
UI
Patch
UISP Router and Console has been updated to fix several security vulnerabilities. Highest CVSSv3 score of 7.5
More info.
Thursday 25 April 2024
Cisco
Exploit
A vulnerability in the management and VPN web servers for Cisco ASA and FTD Software could allow a remote attacker to cause the device to reload unexpectedly, resulting in a DoS. CVSSv3 score of 8.6
This is actively exploited.
More info.
Broadcom
Patch
Dell
Patch
Dell has updated Terraform Provider for Redfish, Terraform Provider for PowerStore, APEX Cloud Platform for Microsoft Azure, APEX Cloud Platform Foundation Software, PowerFlex Rack, and PowerFlex Appliance to fix vulnerabilities in third-party software. Dell rates these High.
More info. And here. And here. And here. And here.
Dell has updated ObjectScale to fix vulnerabilities in third-party software. Dell rates this Critical.
More info.
HPE
Patch
Security vulnerabilities have been identified in HPE SAN switches with the Brocade Fabric OS. Highest CVSSv3 score of 9.8
More info.
Wednesday 24 April 2024
BD
Patch
BD has provided security patches for third-party software for Care Coordination Engine.
More info.
HCL
Software
Patch
The Domino Blog template contains a version of Dojo susceptible to a Prototype Pollution vulnerability. CVSSv3 score of 9.8
More info.
FreeRDP
Patch
Several security vulnerabilities have been patched in FreeRDP. Highest CVSSv3 score of 9.8
More info.
Moxa
Patch
The AIG-301 Series is affected by multiple Azure uAMQP vulnerabilities that could allow a remote attacker to achieve RCE. CVSSv3 score of 9.8
More info.
Meinberg
Patch
Lantime has been updated to fix several security vulnerabilities in third-party software.
More info.
Patch
Chrome for Desktop has been updated to fix 4 security vulnerabilties, at least 1 rated Critical.
More info.
PowerDNS
Patch
A crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a DoS. CVSSv3 score of 7.5
More info.
Tuesday 23 April 2024
Hitachi
Patch
A session hijacking vulnerability exists in Hitachi Ops Center Analyzer. CVSSv3 score of 7.5
More info.
BD
Patch
BD has provided security patches for third-party software for Pyxis, Alaris, Identity Provider Manager, and Data Agent.
More info.
WatchGuard
Patch
Fireware OS and WSM Management Server are vulnerable to Diffie-Hellman Key Agreement Protocal weaknesses. CVSSv3 score of 7.5.
Note the CVEs are old, one from 2002, one from 2022.
More info.
Linux
Patch
Monday 22 April 2024
Dräger
New
Dräger Core and M540 Converter Service contains a vulnerability that allows a remote attacker to send a specially crafted SDC message and cause a DoS. CVSSv3 score of 7.5
Patches will be provided in the next product release.
More info.
Moxa
Patch
The AIG-301 Series product is affected by multiple Azure uAMQP vulnerabilities. A remote attacker can achieve RCE. Highest CVSSv3 score of 9.8
More info.
Siemens
Exploit
RUGGEDCOM APE 1808 devices contain the Palo Alto Networks GlobalProtect, and the associated vulnerability. They are preparing patches. Implement countermeasures. CVSSv3 score of 10.
More info.
IBM
Patch
Multiple security vulnerabilities have been addressed in updates to Security Verify Governance - Identity Manager. Highest CVSSv3 score of 9.8
More info.
Multiple vulnerabilities affect Db2 on Cloud Pak for Data, and Db2 Warehouse on Cloud Pak for Data. Highest CVSSv3 score of 9.8
More info.
Edge Application Manager 4.5.5 addresses several security vulnerabilities. Highest CVSSv3 score of 9.8
More info.
IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to multiple Base OS issues. Highest CVSSv3 score of 9.8
More info.
Order Management removed parts of legacy code that carried vulnerabilites. Highest CVSSv3 score of 10
More info.
ownCloud
Patch
Improper validation may allow a remote attacker to bypass authentication and gain access to users’ files. Prior knowledge of a username and a file path is needed in order to gain access to a certain file. CVSSv3 score of 7.5
More info.
Linux
Patch
Ubuntu has updated the kernel. More info.
Friday 19 April 2024
Palo Alto
Networks
Exploit
All patches are now out. CVSSv4 score of 10.
Actively exploited.
More info.
Rockwell
Automation
Patch
FactoryTalk Production Centre is vulnerable to an Apache ActiveMQ vulnerability. CVSSv3 score of 9.8
More info.
Microsoft
Patch
Microsoft has updated Edge with the latest chromium updates as well as three Edge-specific updates.
More info.
Dell
Patch
Xerox
New
Workplace Cloud contains a Critical vulnerability in the Job Processing feature. Xerox recommends disabling the Job Processing feature until a patch is available.
More info.
NetApp
New
NetApp has published 10 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 10.
More info.
Unitronics
New
Unitronics Vision Standard PLCs allow a remote attacker to retrieve the 'Information Mode' password in plaintext. CVSSv3 score of 7.5
More info.
Thursday 18 April 2024
Palo Alto
Networks
Exploit
PoCs are out for the GlobalProtect vulnerability. CVSSv4 score of 10.
Actively exploited. More patches expected today and tomorrow.
More info.
Cisco
Patch
Cisco has released 3 new bulletins, 2 rated High and 1 rated Medium. Highest CVSSv3 score of 8.8
More info.
A vulnerability in the implementation of SNMP IPv4 ACL could allow a remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic. CVSSv3 score of 5.3
More info.
Mitel
Patch
Authentication bypass vulnerability and an Information Disclosure vulnerability in the 6800 Series, 6900 Series and 6900w Series SIP Phones, including 6970 Conference Unit could allow a remote attacker to conduct an unauthorized access attack due to improper authentication control. Highest CVSSv3 score of 6.5
More info. And here.
Broadcom
Patch
ClamAV
Patch
A vulnerability exists in the HTML file parser that could cause a DoS. CVSSv3 score of 7.5
More info.
Atlassian
Patch
Seven high-severity vulnerabilities have been fixed in Bamboo/Confluence/Jira Data Center and Server. Highest CVSSv3 score of 8.2
More info.
Linux
Patch
Wednesday 17 April 2024
Palo Alto
Networks
Exploit
The GlobalProtect vulnerability guidance is changing, disabling Telemetry, previously reported as a workaround, does not provide protection. CVSSv4 score of 10.
Actively exploited. Some patches available.
More info.
Mozilla
Patch
Mozilla has updated Firefox and Firefox ESR for vulnerabilities rated High.
More info.
Electrolink
New
Electrolink transmitters are vulnerable to Several security vulnerabilities, including Authentication Bypass, Missing Authentication, and Cleartext Storage of Sensitive Information. Highest CVSSv4 score of 8.7
More info.
Broadcom
Patch
Patch
Chrome for Desktop has been updated to fix 23 security vulnerabilities.
More info.
Ivanti
Patch
Avalanche has been updated to address vulnerabilities reported last month. Highest CVSSv3 score of 9.8
More info.
Tuesday 16 April 2024
Oracle
Patch
Oracle Quarterly Critical Patch Update is out, with 441 security patches, with 285 of these exploitable without authentication.
More info.
Hitachi
Patch
Hitachi has published updates in JP1 and Cosminexus.
More info.
PuTTY
Patch
Biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures.
More info.
Linux
Patch
Red Hat has updated the kernel. More info.
Monday 15 April 2024
Palo Alto
Networks
Exploit
A command injection vulnerability in the GlobalProtect feature for specific PAN-OS versions and distinct feature configurations may enable a remote attacker to execute arbitrary code with root privileges on the firewall. CVSSv4 score of 10
Some patches are now available.
Exploits reported.
More info.
Microsoft
Patch
Microsoft has updated Edge with the latest chromium updates
More info.
HPE
Patch
Security vulnerabilities have been identified in HPE Superdome Flex, Superdome Flex 280 and Compute Scale-up Server 3200 that could be exploited to overwrite SMM memory leading to execution of arbitrary code with privilege elevation. CVSSv3 score of 9.8
More info.
HP
Patch
HP ThinPro contains security vulnerabilities. Highest CVSSv3 score of 9.8
More info.
NetApp
Patch
NetApp has published 13 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 8.4
Six have patches.
More info.
Friday 12 April 2024
Palo Alto
Networks
0-Day
A command injection vulnerability in the GlobalProtect feature for specific PAN-OS versions and distinct feature configurations may enable a remote attacker to execute arbitrary code with root privileges on the firewall. CVSSv4 score of 10
Patches expected by 14 April, this is being exploited.
More info.
Rockwell
Automation
Patch
An input validation vulnerability exists in 5015-AENFTXT that causes the secondary adapter to result in a major nonrecoverable fault when malicious input is entered resulting in a DoS that requires a manual restart. CVSSv4 score of 8.7
More info.
ControlLogix and GuardLogix are vulnerable to a major nonrecoverable fault due to an invalid header value resulting in a DoS that requires a manual restart. CVSSv4 score of 9.2
More info.
Dell
Patch
Storage Resource Manager and Storage Monitoring and Reporting remediation is available for multiple security vulnerabilities. Dell rates this Critical.
More info.
IBM
Patch
IBM Sterling B2B Integrator uses Apache Commons BCEL and contains a vulnerability. CVSSv3 score of 9.8
More info.
Due to use of Postgresql JDBC, IBM Instana Observability is vulnerable to SQL injection. CVSSv3 score of 10
More info.
IBM Disconnected Log Collector includes components with known vulnerabilities. Highest CVSSv3 score of 9.8
More info.
IBM QRadar SIEM includes vulnerable components that could be identified and exploited with automated tools. Highest CVSSv3 score of 9.8.
More info.
Linux
Patch
SUSE has updated the kernel. More info.
Thursday 11 April 2024
Patch
Palo Alto
Networks
Patch
Monthly Patches are out for Palo Alto Networks with 8 bulletins, 4 rated High, 3 Medium, and 1 Informational. Highest CVSSv3 score of 8.3
More info.
A packet processing mechanism in PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online. CVSSv3 score of 8.2
More info.
A vulnerability in PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving NTLM packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.
More info.
A memory leak exists in PAN-OS software that enables a remote attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. CVSSv3 score of 8.2
More info.
Languages
New
A vulnerability was discovered in the way multiple programming languages fail to properly escape the arguments in a Microsoft Windows command execution environment. Successful exploitation of this vulnerability permits an attacker to execute arbitrary commands.
This affects Haskell, Node.js, Rust (reported yesterday), PHP, yt-dlp, and perhaps others.
More info.
Node.js has updated. More info.
Juniper
Networks
Patch
Juniper Networks April Patches include 36 bulletins, 3 rated Critical, 10 rated High, and 23 rated Medium. Highest CVSSv3 score of 9.8
More info.
Multiple vulnerabilities have been resolved in Juniper Networks Junos cRPD and Juniper Cloud Native Router by updating third party software. Some CVEs date back to 2011. Highest CVSSv3 score of 9.8
More info. And here.
Multiple vulnerabilities have been resolved in Juniper Networks Junos OS and Junos OS Evolved by updating cURL libraries. Highest CVSSv3 score of 9.8
More info.
Spring
Patch
Spring Framework has been patched to fix a URL Parsing vulnerability. CVSSv3 score of 8.1
More info.
IBM
Patch
QRadar Suite Software includes components with known vulnerabilities. Highest CVSSv3 score of 10.
More info.
IBM Sterling B2B Integrator uses Apache CXF. Highest CVSSv3 score of 9.8
More info.
IBM Maximo Application Suite - Monitor Component uses Node.js IP which is vulnerable. CVSSv3 score of 9.8
More info.
A vulnerable version of the Postgresql JDBC driver is shipped with IBM Tivoli Netcool Impact. CVSSv3 score of 10.
More info.
Vulnerabilities have been identified with the DS8900F Hardware Management Console (HMC). Highest CVSSv3 score of 9.8
More info.
Wednesday 10 April 2024
Microsoft
Patch
Adobe
Patch
Fortinet
Patch
Fortinet Monthly Patches includes 13 bulletins. Highest CVSSv3 score of 9.4
More info.
A vulnerability in FortiClientLinux may allow a remote attacker to execute arbitrary code via tricking a FortiClientLinux user into visiting a malicious website. CVSSv3 score of 9.4
More info.
A vulnerability in FortiOS may allow a remote attacker to fingerprint the device version via HTTP requests. CVSSv3 score of 5
More info.
A vulnerability in FortiNAC-F may allow a remote attacker to perform a MitM attack on the HTTPS communication channel between the FortiOS device, an inventory, and FortiNAC-F. CVSSv3 score of 4.4
More info.
Rust
Patch
The Rust standard library did not properly escape arguments when invoking batch files on Windows using the Command API. A remote attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands. CVSSv3 score of 10
More info.
Pepperl
+Fuchs
New
Pepperl+Fuchs: ICE2- * and ICE3- * products are affected by multiple vulnerabilities in third-party software. Highest CVSSv3 score of 7.5
No patches yet.
More info.
HPE
Patch
Security vulnerabilities have been identified in HPE Unified Correlation Analyzer that could be exploited by a remote attacker to allow RCE, DoS, unauthorized access, memory corruption, XML external entity (XXE), and insecure deserialization. Highest CVSSv3 score of 9.8
More info.
Linux
Patch
Tuesday 09 April 2024
SAP
Patch
SAP Security Patch Day saw the release of 10 new Security Notes and 2 updated Security Notes. Highest CVSSv3 score of 8.8
More info.
Siemens
Patch
Siemens Monthly Patches are out, with 8 new bulletins and 11 updated bulletins. Highest CVSSv3 score of 9.8
More info.
The SCALANCE W1750D devices contain multiple vulnerabilities that could allow a remote attacker to achieve to information disclosure or RCE. Highest CVSSv3 score of 9.8
More info.
SINEC NMS is affected by multiple vulnerabilities. Highest CVSSv3 score of 7.6
More info.
Siemens has released a new version for Telecontrol Server Basic that fixes multiple vulnerabilities. Highest CVSSv3 score of 8.8
More info.
Multiple vulnerabilities in Palo Alto Networks Virtual NGFW exist on RUGGEDCOM APE1808 devices. Highest CVSSv3 score of 8.8
More info. And here.
Schneider
Electric
Patch
Schneider Electric includes 1 new bulletin and 3 updated bulletins in their Monthly Patches. The new bulletin has a CVSSv3 score of 7.8
More info.
Unisoc
Patch
Monthly Patches for Unisoc chipset for Android are out with 4 addressed vulnerabilities. Highest CVSSv3 score of 6.2
More info.
Welotec
Patch
Welotec has reported two vulnerabilities in the TK500v1 router series that could allow a remote attacker to manipulate the device. Highest CVSSv3 score of 9.8
More info.
Monday 08 April 2024
FRRouting
Patch
In FRRouting a remote attacker using a malformed Prefix SID attribute in a BGP UPDATE packet can cause the bgpd daemon to crash. CVSSv3 score of 7.5
More info.
Westermo
Patch
WeOS uses the WebDAV PROPFIND and could allow a remote attacker to obtain sensitive information. CVSSv3 score of 5.3
More info.
Dell
Patch
OpenSSL
New
A remote attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a DoS.
No patches available.
More info.
PRODUCT
GUARDED
This alert state represents the return towards normalisation of an alert state, indicating that there was a higher alert state due to a product vulnerability during the previous few days.
PRODUCT
INCREASED
This alert state indicates that a product vulnerability has been identified within the last few days. The vulnerability is either difficult to exploit, or if exploited, results in reduced impact to the target system.
PRODUCT
HIGH
This alert state indicates a more serious vulnerability which is exploitable.
PRODUCT
CRITICAL
This alert state indicates a significant threat to the product, where exploits exist or where the vulnerability is potentially devastating.
NEW
NEW
This bottom descriptor is used with a vulnerability which has been identified in the last 24 hours, with no patch or exploit. It will typically be paired with Increased.
+24hrs
+24hrs
This bottom descriptor is used with Indicates an alert state which has been present for more than 24 hours. It will typically be paired with Guarded, and could be changed to +48hr for an item that came out as Critical.
Patch
PATCH
This bottom descriptor indicates that patches are available for vulnerabilities, whether it is the initial report or a patch of a vulnerability that had been previously reported. It could be paired with Increased or High, and on rare occasions Critical.
Exploit
EXPLOIT
This bottom descriptor indicates that an Exploit has been made public for a vulnerability, whether it is the initial report or an indication of an exploit for a vulnerability that had been previously reported. It could be paired with High or Critical.
ZERO
ZERO DAY
This bottom descriptor indicates that a vulnerability has been announced without the opportunity for the vendor to patch it before the details are made known. It could be paired with High or Critical.