Kwetsbaarheden - Week 29

Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.

Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.

Critical & High

Oracle VM VirtualBox

https://nvd.nist.gov/vuln/detail/CVE-2022-21571 (8.2)

Zyxel USG Series / ATP Series / VPN Series

https://nvd.nist.gov/vuln/detail/CVE-2022-30526 (7.8)

Juniper Junos OS

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-RIB-and-PFEs-can-get-out-of-sync-due-to-a-memory-leak-caused-by-interface-flaps-or-route-churn-CVE-2022-22209?language=en_US (7.5)

EX Series

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-and-EX-Series-Local-privilege-escalation-flaw-in-download-functionality-CVE-2022-22221?language=en_US (7.8)

 

SRX Series

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-and-EX-Series-Local-privilege-escalation-flaw-in-download-functionality-CVE-2022-22221?language=en_US (7.8)

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-series-The-PFE-will-crash-when-specific-traffic-is-scanned-by-Enhanced-Web-Filtering-safe-search-CVE-2022-22206?language=en_US (7.5)

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-Series-An-FPC-memory-leak-can-occur-in-an-APBR-scenario-CVE-2022-22205?language=en_US (7.5)

 

MX Series

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC11-In-a-GNF-node-slicing-scenario-gathering-AF-interface-statistics-can-lead-to-a-kernel-crash-CVE-2022-22207?language=en_US (7.5)

Juniper Junos OS Evolved

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-hostbound-traffic-will-cause-unexpected-hostbound-traffic-delays-or-drops-CVE-2022-22212?language=en_US (7.5)

Grafana

https://nvd.nist.gov/vuln/detail/CVE-2022-31097 (7.3)

https://nvd.nist.gov/vuln/detail/CVE-2022-31107 (7.1)

Sonicwall Hosted Email Security

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0014 (7.2)

AnyDesk

https://nvd.nist.gov/vuln/detail/CVE-2022-32450 (n/a)

BeyondTrust Priviliged Remote Access

https://www.beyondtrust.com/docs/release-notes/privileged-remote-access/privileged-remote-access-22-1-4.htm (n/a)

Unit4 ERP

https://nvd.nist.gov/vuln/detail/CVE-2022-34001 (n/a)

Medium

Sonicwall Switch

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0013 (6.7)

Juniper Junos OS

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-MPLS-scenario-upon-receipt-of-a-specific-IPv6-packet-an-FPC-will-crash-CVE-2022-22214?language=en_US (6.5)

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-var-run-pid-env-files-are-potentially-not-deleted-during-termination-of-a-gRPC-connection-causing-inode-exhaustion-CVE-2022-22215?language=en_US (6.5)

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Denial-of-Service-DoS-vulnerability-in-RPD-upon-receipt-of-specific-BGP-update-CVE-2022-22213?language=en_US (5.9)

 

EX4600 / EX4650

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-Receipt-of-specific-traffic-will-lead-to-an-fxpc-process-crash-followed-by-an-FPC-reboot-CVE-2022-22203?language=en_US (6.5)

MX Series

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-MX-Series-An-l2alm-crash-leading-to-an-FPC-crash-can-be-observed-in-VxLAN-scenario-CVE-2022-22210?language=en_US (6.5)

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-When-receiving-a-specific-SIP-packets-stale-call-table-entries-are-created-which-eventually-leads-to-a-DoS-for-all-SIP-traffic-CVE-2022-22204?language=en_US (5.3)

SRX Series

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-When-receiving-a-specific-SIP-packets-stale-call-table-entries-are-created-which-eventually-leads-to-a-DoS-for-all-SIP-traffic-CVE-2022-22204?language=en_US (5.3)

 

QFX5000 Series

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-Receipt-of-specific-traffic-will-lead-to-an-fxpc-process-crash-followed-by-an-FPC-reboot-CVE-2022-22203?language=en_US (6.5)

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-MX-Series-An-l2alm-crash-leading-to-an-FPC-crash-can-be-observed-in-VxLAN-scenario-CVE-2022-22210?language=en_US (6.5)

 

PTX Series

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-FPCs-may-restart-unexpectedly-upon-receipt-of-specific-MPLS-packets-with-certain-multi-unit-interface-configurations-CVE-2022-22202?language=en_US (6.5)

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-Etherleak-memory-disclosure-in-Ethernet-padding-data-CVE-2022-22216?language=en_US (4.3)

QFX10000 Series

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX10k-Series-Denial-of-Service-DoS-upon-receipt-of-crafted-MLD-packets-on-multi-homing-ESI-in-VXLAN-CVE-2022-22217?language=en_US (6.1)

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-Etherleak-memory-disclosure-in-Ethernet-padding-data-CVE-2022-22216?language=en_US (4.3)

Juniper Junos OS Evolved

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-MPLS-scenario-upon-receipt-of-a-specific-IPv6-packet-an-FPC-will-crash-CVE-2022-22214?language=en_US (6.5)

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-var-run-pid-env-files-are-potentially-not-deleted-during-termination-of-a-gRPC-connection-causing-inode-exhaustion-CVE-2022-22215?language=en_US (6.5)

https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Denial-of-Service-DoS-vulnerability-in-RPD-upon-receipt-of-specific-BGP-update-CVE-2022-22213?language=en_US (5.9)

Zyxel USG Series / ATP Series / VPN Series

https://nvd.nist.gov/vuln/detail/CVE-2022-2030 (6.5)

Oracle VM VirtualBox

https://nvd.nist.gov/vuln/detail/CVE-2022-21554 (4.4)

Apache CloudStack (SAML 2.0 plugin)

https://nvd.nist.gov/vuln/detail/CVE-2022-35741 (n/a)

Zoho ManageEngine Password Manager Pro

https://nvd.nist.gov/vuln/detail/CVE-2022-35404 (n/a)

https://nvd.nist.gov/vuln/detail/CVE-2022-35405 (n/a)

Zoho ManageEngine OPManager

https://nvd.nist.gov/vuln/detail/CVE-2022-35404 (n/a)

Zoho ManageEngine Access Manager Plus

https://nvd.nist.gov/vuln/detail/CVE-2022-35405 (n/a)

Zoho ManageEngine PAM360

https://nvd.nist.gov/vuln/detail/CVE-2022-35405 (n/a)

Zoho ManageEngine Network Configuration Manager

https://nvd.nist.gov/vuln/detail/CVE-2022-35404 (n/a)