Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.
Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.
Critical & High
Ivanti Endpoint Manager Mobile (EPMM, eerder bekend als MobileIron Core)
https://nvd.nist.gov/vuln/detail/CVE-2023-35078 (10.0)
Veritas NetBackup servers / clients
https://www.veritas.com/content/support/en_US/security/VTS23-010 (9.8)
AMI MegaRAC Baseboard Management Controller
https://nvd.nist.gov/vuln/detail/CVE-2023-34338 (9.8)
https://nvd.nist.gov/vuln/detail/CVE-2023-34329 (9.1)
https://nvd.nist.gov/vuln/detail/CVE-2023-34473 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2023-34337 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2023-34330 (8.2)
https://nvd.nist.gov/vuln/detail/CVE-2023-34471 (8.1)
https://nvd.nist.gov/vuln/detail/CVE-2023-34472 (6.5)
HPE Aruba Access Point
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-009.txt (9.8-7.5)
MikroTik RouterOS
https://nvd.nist.gov/vuln/detail/CVE-2023-30799 (9.1)
Open Access Management (OpenAM)
https://nvd.nist.gov/vuln/detail/CVE-2023-37471 (9.1)
Dell PowerStore Family
https://www.dell.com/support/kbdoc/nl-nl/000215171/dsa-2023-173-dell-powerstore-family-security-update-for-multiple-vulnerabilities (9.0-7.2)
Envoy
https://nvd.nist.gov/vuln/detail/CVE-2023-35944 (8.2)
https://nvd.nist.gov/vuln/detail/CVE-2023-35942 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-35943 (6.3)
Ivanti Endpoint Manager
https://nvd.nist.gov/vuln/detail/CVE-2023-35077 (8.1)
OpenSSL
https://nvd.nist.gov/vuln/detail/CVE-2023-3446 (7.5)
Checkpoint Endpoint Security Client (Windows)
https://nvd.nist.gov/vuln/detail/CVE-2023-28133 (n/a)
OpenSSH
https://nvd.nist.gov/vuln/detail/CVE-2023-38408 (n/a)
Medium
Libvirt
https://nvd.nist.gov/vuln/detail/CVE-2023-3750 (6.5)
VMWare Tanzu Application Service
https://www.vmware.com/security/advisories/VMSA-2023-0016.html (6.5)
Dell Hybrid Client
https://nvd.nist.gov/vuln/detail/CVE-2023-32476 (6.4)
Cisco Small Business SPA500 Series IP Phone (Web UI)
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-web-multi-7kvPmu2F (6.1-5.8)
Dell Wyse ThinOS
https://www.dell.com/support/kbdoc/nl-nl/000215864/dsa-2023-247 (5.5)
HashiCorp Nomad / Nomad Enterprise
https://nvd.nist.gov/vuln/detail/CVE-2023-3300 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2023-3072 (4.1)
Dell Wyse Management Suite
https://www.dell.com/support/kbdoc/nl-nl/000215351/dsa-2023-240-dell-wyse-management-suite (4.9-4.4)
Cisco Broadworks
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-priv-esc-qTgUZOsQ (4.4)
Openstack Neutron
https://nvd.nist.gov/vuln/detail/CVE-2023-3637 (4.3)