Kwetsbaarheden - Week 29

Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.

Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.

Critical & High

Oracle VM VirtualBox
https://nvd.nist.gov/vuln/detail/CVE-2022-21571 (8.2)

Zyxel USG Series / ATP Series / VPN Series
https://nvd.nist.gov/vuln/detail/CVE-2022-30526 (7.8)

Juniper Junos OS
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-RIB-and-PFEs-can-get-out-of-sync-due-to-a-memory-leak-caused-by-interface-flaps-or-route-churn-CVE-2022-22209?language=en_US (7.5)

EX Series
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-and-EX-Series-Local-privilege-escalation-flaw-in-download-functionality-CVE-2022-22221?language=en_US (7.8)
 

SRX Series
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-and-EX-Series-Local-privilege-escalation-flaw-in-download-functionality-CVE-2022-22221?language=en_US (7.8)
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-series-The-PFE-will-crash-when-specific-traffic-is-scanned-by-Enhanced-Web-Filtering-safe-search-CVE-2022-22206?language=en_US (7.5)
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-Series-An-FPC-memory-leak-can-occur-in-an-APBR-scenario-CVE-2022-22205?language=en_US (7.5)
 

MX Series
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC11-In-a-GNF-node-slicing-scenario-gathering-AF-interface-statistics-can-lead-to-a-kernel-crash-CVE-2022-22207?language=en_US (7.5)

Juniper Junos OS Evolved
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-hostbound-traffic-will-cause-unexpected-hostbound-traffic-delays-or-drops-CVE-2022-22212?language=en_US (7.5)

Grafana
https://nvd.nist.gov/vuln/detail/CVE-2022-31097 (7.3)
https://nvd.nist.gov/vuln/detail/CVE-2022-31107 (7.1)

Sonicwall Hosted Email Security
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0014 (7.2)

AnyDesk
https://nvd.nist.gov/vuln/detail/CVE-2022-32450 (n/a)

BeyondTrust Priviliged Remote Access
https://www.beyondtrust.com/docs/release-notes/privileged-remote-access/privileged-remote-access-22-1-4.htm (n/a)

Unit4 ERP
https://nvd.nist.gov/vuln/detail/CVE-2022-34001 (n/a)

Medium

Sonicwall Switch
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0013 (6.7)

Juniper Junos OS
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-MPLS-scenario-upon-receipt-of-a-specific-IPv6-packet-an-FPC-will-crash-CVE-2022-22214?language=en_US (6.5)
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-var-run-pid-env-files-are-potentially-not-deleted-during-termination-of-a-gRPC-connection-causing-inode-exhaustion-CVE-2022-22215?language=en_US (6.5)
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Denial-of-Service-DoS-vulnerability-in-RPD-upon-receipt-of-specific-BGP-update-CVE-2022-22213?language=en_US (5.9)
 

EX4600 / EX4650
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-Receipt-of-specific-traffic-will-lead-to-an-fxpc-process-crash-followed-by-an-FPC-reboot-CVE-2022-22203?language=en_US (6.5)

MX Series
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-MX-Series-An-l2alm-crash-leading-to-an-FPC-crash-can-be-observed-in-VxLAN-scenario-CVE-2022-22210?language=en_US (6.5)
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-When-receiving-a-specific-SIP-packets-stale-call-table-entries-are-created-which-eventually-leads-to-a-DoS-for-all-SIP-traffic-CVE-2022-22204?language=en_US (5.3)

SRX Series
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-When-receiving-a-specific-SIP-packets-stale-call-table-entries-are-created-which-eventually-leads-to-a-DoS-for-all-SIP-traffic-CVE-2022-22204?language=en_US (5.3)
 

QFX5000 Series
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-Receipt-of-specific-traffic-will-lead-to-an-fxpc-process-crash-followed-by-an-FPC-reboot-CVE-2022-22203?language=en_US (6.5)
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-MX-Series-An-l2alm-crash-leading-to-an-FPC-crash-can-be-observed-in-VxLAN-scenario-CVE-2022-22210?language=en_US (6.5)
 

PTX Series
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-FPCs-may-restart-unexpectedly-upon-receipt-of-specific-MPLS-packets-with-certain-multi-unit-interface-configurations-CVE-2022-22202?language=en_US (6.5)
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-Etherleak-memory-disclosure-in-Ethernet-padding-data-CVE-2022-22216?language=en_US (4.3)

QFX10000 Series
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX10k-Series-Denial-of-Service-DoS-upon-receipt-of-crafted-MLD-packets-on-multi-homing-ESI-in-VXLAN-CVE-2022-22217?language=en_US (6.1)
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-Etherleak-memory-disclosure-in-Ethernet-padding-data-CVE-2022-22216?language=en_US (4.3)

Juniper Junos OS Evolved
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-MPLS-scenario-upon-receipt-of-a-specific-IPv6-packet-an-FPC-will-crash-CVE-2022-22214?language=en_US (6.5)
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-var-run-pid-env-files-are-potentially-not-deleted-during-termination-of-a-gRPC-connection-causing-inode-exhaustion-CVE-2022-22215?language=en_US (6.5)
https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Denial-of-Service-DoS-vulnerability-in-RPD-upon-receipt-of-specific-BGP-update-CVE-2022-22213?language=en_US (5.9)

Zyxel USG Series / ATP Series / VPN Series
https://nvd.nist.gov/vuln/detail/CVE-2022-2030 (6.5)

Oracle VM VirtualBox
https://nvd.nist.gov/vuln/detail/CVE-2022-21554 (4.4)

Apache CloudStack (SAML 2.0 plugin)
https://nvd.nist.gov/vuln/detail/CVE-2022-35741 (n/a)

Zoho ManageEngine Password Manager Pro
https://nvd.nist.gov/vuln/detail/CVE-2022-35404 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-35405 (n/a)

Zoho ManageEngine OPManager
https://nvd.nist.gov/vuln/detail/CVE-2022-35404 (n/a)

Zoho ManageEngine Access Manager Plus
https://nvd.nist.gov/vuln/detail/CVE-2022-35405 (n/a)

Zoho ManageEngine PAM360
https://nvd.nist.gov/vuln/detail/CVE-2022-35405 (n/a)

Zoho ManageEngine Network Configuration Manager
https://nvd.nist.gov/vuln/detail/CVE-2022-35404 (n/a)