Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.
Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.
Critical & High
vm2
https://nvd.nist.gov/vuln/detail/CVE-2023-29199 (9.8)
https://nvd.nist.gov/vuln/detail/CVE-2023-30547 (9.8)
SecurePoint UTM
https://nvd.nist.gov/vuln/detail/CVE-2023-22620 (9.0)
https://nvd.nist.gov/vuln/detail/CVE-2023-22897 (6.5)
SolarWinds Platform
https://www.solarwinds.com/trust-center/security-advisories/cve-2022-36… (8.8)
https://www.solarwinds.com/trust-center/security-advisories/cve-2022-47… (7.8)
https://www.solarwinds.com/trust-center/security-advisories/cve-2022-47… (4.3)
Tribe29 Checkmk
https://nvd.nist.gov/vuln/detail/CVE-2023-22294 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2023-22307 (5.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-2020 (4.3)
Juniper Networks Junos OS Evolved
https://nvd.nist.gov/vuln/detail/CVE-2023-28983 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2023-28960 (8.2)
https://nvd.nist.gov/vuln/detail/CVE-2023-28966 (7.8)
https://nvd.nist.gov/vuln/detail/CVE-2023-28973 (7.1)
https://nvd.nist.gov/vuln/detail/CVE-2023-28978 (5.3)
Oracle VM VirtualBox
https://nvd.nist.gov/vuln/detail/CVE-2023-21990 (8.2)
https://nvd.nist.gov/vuln/detail/CVE-2023-21987 (7.8)
https://nvd.nist.gov/vuln/detail/CVE-2023-21989 (6.0)
https://nvd.nist.gov/vuln/detail/CVE-2023-22002 (6.0)
https://nvd.nist.gov/vuln/detail/CVE-2023-21998 (4.6)
https://nvd.nist.gov/vuln/detail/CVE-2023-22000 (4.6)
https://nvd.nist.gov/vuln/detail/CVE-2023-22001 (4.6)
https://nvd.nist.gov/vuln/detail/CVE-2023-21997 (4.3)
HPE OneView
https://nvd.nist.gov/vuln/detail/CVE-2023-28091 (7.9)
Juniper Networks Junos OS / Juno OS Evolved
https://nvd.nist.gov/vuln/detail/CVE-2023-28964 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-28967 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-28982 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-28981 (6.5)
Traefik
https://nvd.nist.gov/vuln/detail/CVE-2023-29013 (7.5)
Juniper Networks Junos OS
https://nvd.nist.gov/vuln/detail/CVE-2023-28974 (7.4)
https://nvd.nist.gov/vuln/detail/CVE-2023-1697 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-28965 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-28962 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2023-28963 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2023-28984 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2023-28979 (4.7)
https://nvd.nist.gov/vuln/detail/CVE-2023-28975 (4.6)
MX Series
https://nvd.nist.gov/vuln/detail/CVE-2023-28976 (7.5)
NFX Series
https://nvd.nist.gov/vuln/detail/CVE-2023-28972 (6.8)
JRR200
https://nvd.nist.gov/vuln/detail/CVE-2023-28970 (6.5)
QFX10002
https://nvd.nist.gov/vuln/detail/CVE-2023-28959 (6.5)
ACX Series
https://nvd.nist.gov/vuln/detail/CVE-2023-28961 (5.8)
SRX Series
https://nvd.nist.gov/vuln/detail/CVE-2023-28968 (5.3)
Cilium
https://nvd.nist.gov/vuln/detail/CVE-2023-29002 (7.2)
Juniper Networks Paragon Active Assurance (PAA)
https://nvd.nist.gov/vuln/detail/CVE-2023-28971 (7.2)
Jenkins diverse plugins
https://www.jenkins.io/security/advisory/2023-04-12/ (high-medium)
Medium
Qualys Cloud Agent
https://nvd.nist.gov/vuln/detail/CVE-2023-28140 (6.7)
https://nvd.nist.gov/vuln/detail/CVE-2023-28141 (6.7)
https://nvd.nist.gov/vuln/detail/CVE-2023-28142 (6.7)
https://nvd.nist.gov/vuln/detail/CVE-2023-28143 (6.7)
Nextcloud Server / Server Enterprise
https://nvd.nist.gov/vuln/detail/CVE-2023-30539 (6.5)
Palo Alto Networks PAN-OS
https://nvd.nist.gov/vuln/detail/CVE-2023-0004 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-0005 (4.1)
Palo Alto Networks GlobalProtect
https://nvd.nist.gov/vuln/detail/CVE-2023-0006 (6.3)
Redis
https://nvd.nist.gov/vuln/detail/CVE-2023-28856 (5.5)