Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.
Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.
Critical & High
Centreon
https://nvd.nist.gov/vuln/detail/CVE-2024-0637 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-23119 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-23115 (7.2)
https://nvd.nist.gov/vuln/detail/CVE-2024-23116 (7.2)
https://nvd.nist.gov/vuln/detail/CVE-2024-23117 (7.2)
https://nvd.nist.gov/vuln/detail/CVE-2024-23118 (7.2)
Redis
https://nvd.nist.gov/vuln/detail/CVE-2024-3019 (8.8)
GitLab CE/EE
https://about.gitlab.com/releases/2024/03/27/security-release-gitlab-16… (8.7-4.3)
Cisco Access Point (AP) Software
https://nvd.nist.gov/vuln/detail/CVE-2024-20271 (8.6)
https://nvd.nist.gov/vuln/detail/CVE-2024-20265 (5.9)
Cisco IOS XE Software
https://nvd.nist.gov/vuln/detail/CVE-2024-20259 (8.6)
https://nvd.nist.gov/vuln/detail/CVE-2024-20314 (8.6)
https://nvd.nist.gov/vuln/detail/CVE-2024-20316 (5.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-20324 (5.5)
Cisco IOS Software and Cisco IOS XE Software
https://nvd.nist.gov/vuln/detail/CVE-2024-20311 (8.6)
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAd… (8.1-6.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-20312 (7.4)
Jupyter JupyterHub
https://nvd.nist.gov/vuln/detail/CVE-2024-28233 (8.1)
ForgeRock Access Management
https://nvd.nist.gov/vuln/detail/CVE-2023-0582 (8.1)
Cilium
https://nvd.nist.gov/vuln/detail/CVE-2024-28860 (8.0)
Dell PowerScale OneFS
https://www.dell.com/support/kbdoc/en-us/000223366/dsa-2024-115-securit… (7.9-5.3)
Cisco IOS Software for Cisco Catalyst 6000 Series Switches
https://nvd.nist.gov/vuln/detail/CVE-2024-20276 (7.4)
Cisco IOS XE Software for Wireless LAN Controllers (WLCs)
https://nvd.nist.gov/vuln/detail/CVE-2024-20303 (7.4)
VMware SD-WAN Edge / SD-WAN Orchestrator
https://www.vmware.com/security/advisories/VMSA-2024-0008.html (7.4-4.8)
Dell vApp Manager
https://www.dell.com/support/kbdoc/en-us/000223609/dsa-2024-108-dell-po… (7.2)
Octopus Server
https://advisories.octopus.com/post/2024/sa2024-01/ (high)
Linux Kernel Netfilter
https://nvd.nist.gov/vuln/detail/CVE-2023-52628 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-26668 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-26673 (n/a)
Thales Imperva SecureSphere WAF
https://nvd.nist.gov/vuln/detail/CVE-2023-50969 (n/a)
Medium
Argo CD
https://nvd.nist.gov/vuln/detail/CVE-2024-29893 (6.5)
Cisco IOS XE Software
https://nvd.nist.gov/vuln/detail/CVE-2024-20278 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-20306 (6.0)
https://nvd.nist.gov/vuln/detail/CVE-2024-20309 (5.6)
IBM Security Verify Access
https://nvd.nist.gov/vuln/detail/CVE-2024-25027 (6.2)
Dell OpenManage Enterprise
https://nvd.nist.gov/vuln/detail/CVE-2024-25944 (5.7)
Dell PowerProtect Data Manager
https://nvd.nist.gov/vuln/detail/CVE-2024-25971 (5.5)
IBM Cloud Pak for Business Automation
https://nvd.nist.gov/vuln/detail/CVE-2023-50959 (5.3)
Cisco Aironet Access Point Software
https://nvd.nist.gov/vuln/detail/CVE-2024-20354 (4.7)
Cisco Catalyst Center (voorheen DNA Center)
https://nvd.nist.gov/vuln/detail/CVE-2024-20333 (4.3)