Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners. Deze selectie wordt gezamenlijk met relevant nieuws verspreid in de Mid of Week.
De inschatting van low/medium/high wordt gemaakt op basis van de CVSS 3.1 base score van de kwetsbaarheid. 0.0-3.9 is low, 4.0-6.9 is medium, 7.0-10.0 is high.
Kwetsbaarheden die als low worden geclassificeerd komen niet in dit overzicht terug.
High
Pulse Connect Secure
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/ (10.0)
Juniper Networks Junos OS
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11141 (10.0)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11147 (9.8)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11159 (8.8)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11160 (8.8)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11166 (8.8)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11144 (8.6)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11142 (8.1)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11157 (8.1)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11138 (7.8)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11145 (7.8)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11146 (7.8)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11122 (7.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11128 (7.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11143 (7.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11152 (7.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11161 (7.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11137 (7.4)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11150 (7.4)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11168 (7.4)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11139 (7.3)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11151 (7.3)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11121 (7.1)
Cisco IOS XR Software
https://nvd.nist.gov/vuln/detail/CVE-2021-1485 (7.8)
VMWare NSX-T
https://nvd.nist.gov/vuln/detail/CVE-2021-21981 (7.5)
Medium
Juniper Networks Junos OS
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11117 (6.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11118 (6.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11119 (6.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11126 (6.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11131 (6.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11132 (6.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11134 (6.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11135 (6.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11148 (6.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11162 (6.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11163 (6.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11149 (5.9)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11154 (5.9)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11155 (5.9)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11120 (5.8)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11129 (5.8)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11133 (5.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11175 (5.5)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11124 (5.3)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11164 (5.3)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11140 (5.1)
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11136 (4.7)
Palo Alto Networks Bridgecrew Checkov
https://nvd.nist.gov/vuln/detail/CVE-2021-3035 (6.7)
Palo Alto Networks Global Protect (Windows)
https://nvd.nist.gov/vuln/detail/CVE-2021-3038 (5.5)
Palo Alto Networks PAN-OS
https://nvd.nist.gov/vuln/detail/CVE-2021-3036 (4.4)
Bent u een digitale dienstverlener en wenst u onze complete Mid of Week te ontvangen? Dan kunt u per e-mail uw aanmelding doorgeven. Vermeld hierbij het e-mailadres waar u de Mid of Week op wenst te ontvangen.