CISA の Bulletin (SB22-185) (06/27週)には、441個もの「severity not yet assigned」な脆弱性が挙げられています。その中から、今回、13個の製品を以下に取り上げます。
◆apache -- shiro
Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
Apache Shiro 1.9.1 以前では、RegexRequestMatcher の設定に誤りがあり、
NIST: NVD Base Score: 9.8 CRITICAL
◆centum -- multiple_versions
※ 時々見る為、URLのみ記載しておく。NISTのBase Scoreは執筆現在 N/A。
◆cloudflare -- warp_client_for_windows
Cloudflare WARP client for Windows (up to v. 2022.5.309.0) allowed creation of mount points from its ProgramData folder. During installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.
Cloudflare WARP クライアント Windows 版 (v. 2022.5.309.0 まで) では、ProgramData フォルダからマウントポイントを作成することが可能でした。WA
NIST: NVD Base Score: 7.8 HIGH
CNA: Cloudflare, Inc. Base Score: 5.8 MEDIUM
◆d-link -- dir-645
D-Link DIR-645 v1.03 was discovered to contain a command injection vulnerability via the QUERY_STRING parameter at __ajax_explorer.sgi.
D-Link DIR-645 v1.03 には、__ajax_explorer.sgi の QUERY_STRING パラメータを経由したコマンドインジェクションの脆弱性があるこ
NIST: NVD Base Score: 9.8 CRITICAL
- さり気ないデザインが部屋になじみそう。
◆dell -- powerscale_onefs
Dell PowerScale OneFS, 8.2.x through 9.3.0.x, contain an error message with sensitive information. An administrator could potentially exploit this vulnerability, leading to disclosure of sensitive information. This sensitive information can be used to access sensitive resources.
Dell PowerScale OneFS (8.2.x から 9.3.0.x) には、機密情報を含むエラーメッセージが含まれています。
NIST: NVD Base Score: 4.9 MEDIUM
CNA: Dell Base Score: 9.6 CRITICAL
- この製品はNASのOSらしい。
- NISTの評価がDellよりも二段階低い、珍しいケース。
- CVE-2022-31230 はNIST評価は未だN/A。
◆hpe -- storeonce
A potential security vulnerability has been identified in HPE StoreOnce Software. The SSH server supports weak key exchange algorithms which could lead to remote unauthorized access. HPE has made the following software update to resolve the vulnerability in HPE StoreOnce Software 4.3.2.
HPE StoreOnce Softwareに潜在的なセキュリティの脆弱性が確認されまし
NIST: NVD Base Score: 7.5 HIGH
◆ibm -- cloudpak
IBM CloudPak for Multicloud Monitoring 2.0 and 2.3 has a few containers running in privileged mode which is vulnerable to host information leakage or destruction if unauthorized access to these containers could execute arbitrary commands. IBM X-Force ID: 211048.
IBM CloudPak for Multicloud Monitoring 2.0 および 2.3 には、特権モードで動作するいくつかのコンテナがあり、
NIST: NVD Base Score: 8.1 HIGH
CNA: IBM Corporation Base Score: 5.3 MEDIUM
- IBMはSeverity=Mediumと評価していた。
◆ibm -- spectrum_protect
An IBM Spectrum Protect storage agent could allow a remote attacker to perform a brute force attack by allowing unlimited attempts to login to the storage agent without locking the administrative ID. A remote attacker could exploit this vulnerability using brute force techniques to gain unauthorized administrative access to both the IBM Spectrum Protect storage agent and the IBM Spectrum Protect Server 8.1.0.000 through 8.1.14 with which it communicates. IBM X-Force ID: 226326.
IBM Spectrum Protect ストレージエージェントは、管理者 ID をロックすることなく、
NIST: NVD Base Score: 9.8 CRITICAL
CNA: IBM Corporation Base Score: 5.9 MEDIUM
- IBMとNISTとで評価に開きがある。
◆microsoft – edge
Windows Updateを有効にしていれば問題は自動回避できそうだが、
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30192, CVE-2022-33638.
Microsoft Edge (Chromium-based) の特権昇格の脆弱性。この CVE ID は、CVE-2022-30192, CVE-2022-33638 (注、それぞれ Base Score = 8.3 High)と一意です。
NIST: NVD
Base Score: 8.3 HIGH
◆vim – vim
久しぶりに眺めるVulnerability Summary で頻繁に取り上げられるvimのCVEを見てみた。
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
NIST: NVD Base Score: 9.8 CRITICAL
CNA: huntr.dev Base Score: 7.8 HIGH
Out-of-bounds Write in Git NIST: NVD
Base Score: 9.8 CRITICAL
CNA: huntr.dev Base Score: 7.8 HIGH
◆wordpress -- analytics_stats_counter_ statistics_plugin
A vulnerability was found in Analytics Stats Counter Statistics Plugin 1.2.2.5 and classified as critical. This issue affects some unknown processing. The manipulation leads to code injection. The attack may be initiated remotely.
Analytics Stats Counter Statistics Plugin 1.2.2.5 に脆弱性が発見され、Critical(重大)
NIST: NVD Base Score: 9.8 CRITICAL
CNA: VulDB Base Score: 7.3 HIGH
◆yokogawa -- stradom
Cleartext transmission of sensitive information vulnerability exists in STARDOM FCN Controller and FCJ Controller R1.01 to R4.31, which may allow an adjacent attacker to login the affected products and alter device configuration settings or tamper with device firmware.
STARDOM FCN Controller および FCJ Controller R1.01 から R4.31 には、機密情報の平文送信の脆弱性が存在し、
NIST: NVD Base Score: 7.5 HIGH
◆yokogawa -- stardom.fcn
Use of hard-coded credentials vulnerability exists in STARDOM FCN Controller and FCJ Controller R4.10 to R4.31, which may allow an attacker with an administrative privilege to read/change configuration settings or update the controller with tampered firmware.
STARDOM FCN Controller および FCJ Controller R4.10 から R4.31 には、ハードコードされた認証情報を使用する脆弱性が存在し、
NIST: NVD Base Score: 7.2 HIGH
No comments:
Post a Comment