Kwetsbaarheden - Week 12

Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.

Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.

Critical & High

Argo CD
https://nvd.nist.gov/vuln/detail/CVE-2024-21652 (9.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-28175 (9.0)
https://nvd.nist.gov/vuln/detail/CVE-2024-21661 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-21662 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-50726 (6.4)

Buildah
https://nvd.nist.gov/vuln/detail/CVE-2024-1753 (8.6)

Atlassian Confluence Data Center and Server
https://nvd.nist.gov/vuln/detail/CVE-2024-21677 (8.3)

Spring Security
https://nvd.nist.gov/vuln/detail/CVE-2024-22257 (8.2)

Cisco IOS XR Software
https://nvd.nist.gov/vuln/detail/CVE-2024-20318 (7.4)
https://nvd.nist.gov/vuln/detail/CVE-2024-20262 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-20315 (5.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-20322 (5.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-20266 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2024-20319 (4.3)
for Cisco 8000 Series Routers / Network Convergence System (NCS) 540 Series / 5700 Series Routers
https://nvd.nist.gov/vuln/detail/CVE-2024-20320 (7.8)
for Cisco ASR 9000 Series Aggregation Services Routers
https://nvd.nist.gov/vuln/detail/CVE-2024-20327 (7.4)

Cilium
https://nvd.nist.gov/vuln/detail/CVE-2024-28248 (7.2)
https://nvd.nist.gov/vuln/detail/CVE-2024-28249 (6.1)
https://nvd.nist.gov/vuln/detail/CVE-2024-28250 (6.1)

Medium

OpenStack Designate
https://nvd.nist.gov/vuln/detail/CVE-2023-6725 (6.6)

IBM Sterling Secure Proxy
https://nvd.nist.gov/vuln/detail/CVE-2023-47162 (6.1)
https://nvd.nist.gov/vuln/detail/CVE-2023-47699 (6.1)
https://nvd.nist.gov/vuln/detail/CVE-2023-47147 (5.9)
https://nvd.nist.gov/vuln/detail/CVE-2023-46182 (5.4)
https://nvd.nist.gov/vuln/detail/CVE-2023-46181 (4.0)

Devolutions Remote Desktop Manager
https://devolutions.net/security/advisories/DEVO-2024-0004 (5.9)

Moby
https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx (5.9)

Palo Alto Networks GlobalProtect
https://nvd.nist.gov/vuln/detail/CVE-2024-2431 (5.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-2432 (4.5)

SonicWall SonicOS
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0004 (5.3)
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0006 (4.9)
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0005 (4.8)

Palo Alto Networks PAN-OS
https://nvd.nist.gov/vuln/detail/CVE-2024-2433 (4.3)