Kwetsbaarheden - Week 20

Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.

Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.

Critical & High

Cacti
https://nvd.nist.gov/vuln/detail/CVE-2024-29895 (10.0)
https://nvd.nist.gov/vuln/detail/CVE-2024-31445 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-31459 (high)
https://nvd.nist.gov/vuln/detail/CVE-2024-30268 (6.1)
https://nvd.nist.gov/vuln/detail/CVE-2024-31443 (5.7)
https://nvd.nist.gov/vuln/detail/CVE-2024-31444 (4.6)
https://nvd.nist.gov/vuln/detail/CVE-2024-31458 (4.6)
https://nvd.nist.gov/vuln/detail/CVE-2024-34340 (4.2)
https://nvd.nist.gov/vuln/detail/CVE-2024-31460 (medium)
https://nvd.nist.gov/vuln/detail/CVE-2024-2454 (n/a)

HPE Aruba Networking Access Point (InstantOS / ArubaOS)
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt (9.8-4.9)

VMware Workstation / Fusion
https://support.broadcom.com/web/ecx/support-content-notification/-/ext… (9.3-7.1)

SolarWinds Access Rights Manager (ARM)
https://nvd.nist.gov/vuln/detail/CVE-2024-28075 (9.0)
https://nvd.nist.gov/vuln/detail/CVE-2024-23473 (8.6)

Microsoft SharePoint Server
https://nvd.nist.gov/vuln/detail/CVE-2024-30044 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-30043 (6.5)

Microsoft Windows
https://advisories.ncsc.nl/advisory?id=NCSC-2024-0210 (8.8)

Fortinet FortiSandbox
https://www.fortiguard.com/psirt/FG-IR-24-054 (8.6)

Fortinet FortiWebManager
https://www.fortiguard.com/psirt/FG-IR-23-222 (8.6)

Veritas System Recovery
https://www.veritas.com/support/en_US/security/VTS24-005 (8.4)

F5 BIG-IP (all modules)
https://nvd.nist.gov/vuln/detail/CVE-2024-31156 (8.0)
https://nvd.nist.gov/vuln/detail/CVE-2024-32761 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-33604 (6.1)
https://nvd.nist.gov/vuln/detail/CVE-2024-27202 (4.7)

Fortinet FortiSOAR
https://www.fortiguard.com/psirt/FG-IR-23-420 (7.7)
https://www.fortiguard.com/psirt/FG-IR-24-052 (6.0)

F5 BIG-IP Next Central Manager
https://nvd.nist.gov/vuln/detail/CVE-2024-21793 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-26026 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-32049 (7.4)
https://nvd.nist.gov/vuln/detail/CVE-2024-33612 (6.8)

F5 BIG-IP (AFM) / BIG-IP Next CNF
https://nvd.nist.gov/vuln/detail/CVE-2024-25560 (7.5)

GitLab CE/EE
https://about.gitlab.com/releases/2024/05/08/patch-release-gitlab-16-11… 7.5-6.5)

Proofpoint Enterprise Protection
https://nvd.nist.gov/vuln/detail/CVE-2024-3676 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-0862 (5.0)

F5 BIG-IP APM
https://nvd.nist.gov/vuln/detail/CVE-2024-28883 (7.4)

Fortinet FortiPortal
https://www.fortiguard.com/psirt/FG-IR-24-021 (7.1)
https://www.fortiguard.com/psirt/FG-IR-23-406 (4.1)

Medium

Fortinet FortiOS
https://www.fortiguard.com/psirt/FG-IR-23-415 (6.8)
https://www.fortiguard.com/psirt/FG-IR-23-195 (6.5)
https://www.fortiguard.com/psirt/FG-IR-24-017 (5.0)

Red Hat Satellite
https://nvd.nist.gov/vuln/detail/CVE-2024-4871 (6.8)

Dell PowerScale OneFS
https://www.dell.com/support/kbdoc/nl-nl/000224860/dsa-2024-163-securit… (6.7-5.3)

Fortinet FortiVoice
https://www.fortiguard.com/psirt/FG-IR-23-282 (6.7)

Zoom Workplace VDI App for Windows
https://www.zoom.com/en/trust/security-bulletin/zsb-24015/ (6.7)

Dell PowerProtect DM5500
https://nvd.nist.gov/vuln/detail/CVE-2024-24908 (6.5)

Fortinet FortiOS / FortiProxy / FortiPAM / FortiSwitchManager
https://www.fortiguard.com/psirt/FG-IR-23-137 (6.5)

IBM Spectrum Fusion HCI
https://nvd.nist.gov/vuln/detail/CVE-2023-43040 (6.5)

Kubernetes azure-file-csi-driver
https://nvd.nist.gov/vuln/detail/CVE-2024-3744 (6.5)

Microsoft Azure
https://advisories.ncsc.nl/advisory?id=NCSC-2024-0211 (6.5)

Zoom Workplace Apps / Meeting SDK (Windows / macOS / Linux / Android / iOS)
https://www.zoom.com/en/trust/security-bulletin/zsb-24014/ (6.5)

Fortinet FortiNAC
https://www.fortiguard.com/psirt/FG-IR-24-040 (6.1)

HPE Aruba Networking AOS-CX Switches
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-005.txt (5.9)

Fortinet FortiAuthenticator
https://www.fortiguard.com/psirt/FG-IR-23-465 (5.8)

QEMU Virtio PCI Bindings
https://access.redhat.com/security/cve/CVE-2024-4693 (5.5)

Fortinet FortiWeb
https://www.fortiguard.com/psirt/FG-IR-23-474 (5.6)
https://www.fortiguard.com/psirt/FG-IR-23-191 (5.2)

Fortinet FortiADC
https://www.fortiguard.com/psirt/FG-IR-23-433 (5.2)

Fortinet FortiOS / FortiProxy SSL-VPN
https://www.fortiguard.com/psirt/FG-IR-23-225 (4.7)

Xen
https://xenbits.xenproject.org/xsa/advisory-457.html (n/a)