◆adobe -- acrobat_reader
執筆現在、High Vulnerabilities が10件以上、割り当てられている。他にも多数。
CVE-2022-34219 CVE-2022-34230 CVE-2022-34221 CVE-2022-34222 CVE-2022-34223 CVE-2022-34225 CVE-2022-34220 CVE-2022-34228 CVE-2022-34229 CVE-2022-34226 CVE-2022-34215 CVE-2022-34233 CVE-2022-34216 CVE-2022-34234 CVE-2022-34236 CVE-2022-34237 CVE-2022-34239 CVE-2022-34217 CVE-2022-34232
* I picked up CVE-2022-34219 below. CVE-2022-34219を以下に取り上げる。
Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Adobe Acrobat Reader バージョン 22.001.20142 (およびそれ以前), 20.005.30334 (およびそれ以前), 17.012.30229 (およびそれ以前) には、現在のユーザーのコンテキストで任意のコードを実行する可能性がある Use After Free の脆弱性が存在します。この問題を利用するには、被害者が悪意のあるファイルを開く必要があるため、ユーザーとの対話が必要です。
2022-07-15
CVSS 3.x Severity and Metrics:
CNA: Adobe Systems Incorporated
・Base Score: 7.8 HIGH
◆dell -- bsafe_crypto-c_micro_edition_and_bsafe_micro_edition_suite
* 7 critical and 2 high vulnerabilities are listed in this week summary of CISA.
I will pick up CVE-2020-35166 below.
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Observable Timing Discrepancy Vulnerability.
Dell BSAFE Crypto-C Micro Edition, 4.1.5 以前のバージョン、および Dell BSAFE Micro Edition Suite, 4.6 以前のバージョンには、Observable Timing Discrepancy 脆弱性が存在します。
2022-07-11
CVSS 3.x Severity and Metrics:
NIST: NVD
・Base Score: 9.8 CRITICAL
・Vector: CVSS:3.1 /Attack Vector: Network/ Attack Complexity: Low/ Integrity Impact: High /Availability Impact: HighCNA: Dell
・Base Score: 5.1 MEDIUM
・Vector: CVSS:3.1 /Attack Vector: Local/ Attack Complexity: High/ Integrity Impact: No /Availability Impact: No
◆honeywell -- honeywell_alerton_ascent_control_module
NIST: NVD Base Score: 8.0 HIGH
◆ibm -- security_verify_identify_manager
IBM Security Verify Identity Manager 10.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 224919.
IBM Security Verify Identity Manager 10.0 は、予想よりも弱い暗号アルゴリズムを使用しており、攻撃者が非常に機密性の高い情報を復号化することができる可能性があります。IBM X-Force ID: 224919.
2022-07-14
CVSS 3.x Severity and Metrics:NIST: NVD
・Base Score: 7.5 HIGH
・Vector: CVSS:3.1/Attack Vector: Network, Attack Complexity: LowCNA: IBM Corporation
・Base Score: 5.1 MEDIUM
・Vector: CVSS:3.0/Attack Vector: Local, Attack Complexity: High
Taro's Note: There are notable differences between NIST and CNA claims.
タロウ注:NISTとCNAの主張には顕著な違いがある。
◆ibm -- security_verify_identify_manager
IBM Security Verify Identity Manager 10.0 contains sensitive information in the source code repository that could be used in further attacks against the system. IBM X-Force ID: 225013.
IBM Security Verify Identity Manager 10.0 は、ソースコードリポジトリに機密情報を含んでおり、システムに対する更なる攻撃に使用される可能性があります。IBM X-Force ID: 225013.
CVSS 3.x Severity and Metrics:NIST: NVD
・Base Score: 7.5 HIGH
・Vector: CVSS:3.1/Attack Complexity: Low /Privileges Required: No /Scope: Unchanged /Confidentiality Impact: HighCNA: IBM Corporation
・Base Score: 3.0 LOW
・Vector: CVSS:3.0/Attack Complexity: High /Privileges Required: :High /Scope: Changed /Confidentiality Impact: LowTaro's Note: There are notable differences between NIST and CNA claims.
タロウ注:NISTとCNAの主張には顕著な違いがある。
◆ibm -- security_verify_identify_manager
IBM Security Verify Identity Manager 10.0 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 224918.
IBM Security Verify Identity Manager 10.0 は、不適切なアカウントロックアウト設定を使用しているため、リモートの攻撃者がアカウント認証情報をブルートフォースで取得できる可能性があります。IBM X-Force ID: 224918.
2022-07-14
CVSS 3.x Severity and Metrics:
NIST: NVD
・Base Score: 7.5 HIGH
・Vector: CVSS:3.1 Confidentiality Impact: High
CNA: IBM Corporation
・Base Score: 5.3 MEDIUM
・Vector: CVSS:3.0 Confidentiality Impact: Low
◆ibm -- siteprotector_appliance
IBM SiteProtector Appliance 3.1.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174142.
IBM SiteProtector Appliance 3.1.1 には、パスワードや暗号キーなどのハードコードされた資格情報が含まれており、この資格情報は、自身の受信認証、外部コンポーネントへの送信通信、または内部データの暗号化に使用されます。IBM X-Force ID: 174142.
2022-07-11
CVSS 3.x Severity and Metrics:
NIST: NVD
・Base Score: 9.8 CRITICAL
・Vector: CVSS:3.1/Attack Complexity: Low /Scope: Unchanged /Integrity Impact: High/ Availability Impact: HighCNA: IBM Corporation
・Base Score: 6.8 MEDIUM
・Vector: CVSS:3.0/Attack Complexity: High /Scope: Changed /Integrity Impact: No/ Availability Impact: No
Taro's Note: There are significant differences between NIST and CNA claims.タロウ注:NISTとCNAの主張には重大な違いがある。
◆sap -- hana
Under special integration scenario of SAP Business one and SAP HANA - version 10.0, an attacker can exploit HANA cockpit's data volume to gain access to highly sensitive information (e.g., high privileged account credentials)
SAP Business oneとSAP HANAの特別な統合シナリオ(バージョン10.0)では、攻撃者がHANAのコックピットのデータ量を悪用して、高度な機密情報(例えば、高権限のアカウント情報)にアクセスすることが可能です。
2022-07-12
CVE-2022-32249
NIST CVSS score NIST: NVD Base Score: 7.5 HIGH
◆siemens -- ruggedcom_ros
A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions), RUGGEDCOM ROS M2200 (All versions), RUGGEDCOM ROS M969 (All versions), RUGGEDCOM ROS RMC (All versions), RUGGEDCOM ROS RMC20 (All versions), RUGGEDCOM ROS RMC30 (All versions), RUGGEDCOM ROS RMC40 (All versions), RUGGEDCOM ROS RMC41 (All versions), RUGGEDCOM ROS RMC8388 (All versions < V5.6.0), RUGGEDCOM ROS RP110 (All versions), RUGGEDCOM ROS RS400 (All versions), RUGGEDCOM ROS RS401 (All versions), RUGGEDCOM ROS RS416 (All versions), RUGGEDCOM ROS RS416v2 (All versions < V5.6.0), RUGGEDCOM ROS RS8000 (All versions), RUGGEDCOM ROS RS8000A (All versions), RUGGEDCOM ROS RS8000H (All versions), RUGGEDCOM ROS RS8000T (All versions), RUGGEDCOM ROS RS900 (32M) (All versions < V5.6.0), RUGGEDCOM ROS RS900G (All versions), RUGGEDCOM ROS RS900G (32M) (All versions < V5.6.0), RUGGEDCOM ROS RS900GP (All versions), RUGGEDCOM ROS RS900L (All versions), RUGGEDCOM ROS RS900W (All versions), RUGGEDCOM ROS RS910 (All versions), RUGGEDCOM ROS RS910L (All versions), RUGGEDCOM ROS RS910W (All versions), RUGGEDCOM ROS RS920L (All versions), RUGGEDCOM ROS RS920W (All versions), RUGGEDCOM ROS RS930L (All versions), RUGGEDCOM ROS RS930W (All versions), RUGGEDCOM ROS RS940G (All versions), RUGGEDCOM ROS RS969 (All versions), RUGGEDCOM ROS RSG2100 (All versions), RUGGEDCOM ROS RSG2100 (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2100P (All versions), RUGGEDCOM ROS RSG2200 (All versions), RUGGEDCOM ROS RSG2288 (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 (All versions < V5.6.0), RUGGEDCOM ROS RSG907R (All versions < V5.6.0), RUGGEDCOM ROS RSG908C (All versions < V5.6.0), RUGGEDCOM ROS RSG909R (All versions < V5.6.0), RUGGEDCOM ROS RSG910C (All versions < V5.6.0), RUGGEDCOM ROS RSG920P (All versions < V5.6.0), RUGGEDCOM ROS RSL910 (All versions < V5.6.0), RUGGEDCOM ROS RST2228 (All versions < V5.6.0), RUGGEDCOM ROS RST2228P (All versions < V5.6.0), RUGGEDCOM ROS RST916C (All versions < V5.6.0), RUGGEDCOM ROS RST916P (All versions < V5.6.0), RUGGEDCOM ROS i800 (All versions), RUGGEDCOM ROS i801 (All versions), RUGGEDCOM ROS i802 (All versions), RUGGEDCOM ROS i803 (All versions).
Affected devices are vulnerable to a web-based code injection attack via the console. An attacker could exploit this vulnerability to inject code into the web server and cause malicious behavior in legitimate users accessing certain web resources on the affected device.
影響を受けるデバイスには、コンソールを経由したウェブベースのコードインジェクション攻撃の脆弱性があります。攻撃者は、この脆弱性を利用して、ウェブサーバーにコードを注入し、影響を受けるデバイス上の特定のウェブリソースにアクセスする正規のユーザーに悪意のある動作をさせることができます。
2022-07-12
CVE-2022-34663
NIST: NVD Base Score: 8.0 HIGH
◆tp-link -- tp-link_tl-wr841n
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected.
TP-Link TL-WR841N V12 (ファームウェアバージョン 3.16.9) デバイスの httpd デーモンにバッファオーバーフローがあり、認証済みのリモート攻撃者が Wi-Fi ネットワークのシステムツールのページへの GET リクエストを介して任意のコードを実行することができます。この問題は、TL-WR841 V12 TL-WR841N(EU)_V12_160624 および TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 と TL-WR841 V10 TL-WR841N_V10_150310 にも影響を及ぼします。
2022-07-14
CVE-2022-30024
NIST: NVD Base Score: 8.8 HIGH
◆verizon -- verizon_5g_home_lvskihp_indoorunit
Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 does not validate the user-provided URL within the crtcmode function's enable_ssh sub-operation of the crtcrpc JSON listener (found at /lib/functions/wnc_jsonsh/crtcmode.sh) A remote attacker on the local network can provide a malicious URL. The data (found at that URL) is written to /usr/sbin/dropbear and then executed as root.
Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 は、(/lib/functions/wnc_jsonsh/crtcmode.sh にある) crtcrpc JSON リスナーの crtcmode 関数の enable_ssh サブ操作内で、ユーザーが提供する URL を検証しません。ローカルネットワーク上のリモート攻撃者が悪質なURLを提供できます。(その URL で見つかった) データは /usr/sbin/dropbear に書き込まれ、その後 root 権限で実行されます。
2022-07-14
CVE-2022-28369
NIST: NVD Base Score: 9.8 CRITICAL
* Other critical ones are in CVE-2022-28373 for IDU and CVE-2022-28375 for ODU (OutDoorUnit).
Source:
Bulletin (SB22-199)
Vulnerability Summary for the Week of July 11, 2022
Original release date: July 18, 2022 | Last revised: July 19, 2022
No comments:
Post a Comment