Kwetsbaarheden - Week 39

Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.

Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.

Critical & High

Traefik
https://nvd.nist.gov/vuln/detail/CVE-2024-45410 (9.8) 

Grafana
https://nvd.nist.gov/vuln/detail/CVE-2024-8986 (9.1)

Envoy
https://nvd.nist.gov/vuln/detail/CVE-2024-7207 (8.2)
https://nvd.nist.gov/vuln/detail/CVE-2024-45807 (7.5) 
https://nvd.nist.gov/vuln/detail/CVE-2024-45810 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-45808 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-45806 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-45809 (5.3) 

Centreon Web
https://thewatch.centreon.com/latest-security-bulletins-64/security-bulletin-for-centreon-web-3809 (7.2)

Medium

Github Enterprise Server
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.17 (6.2-5.8)

Citrix XenServer / Hypervisor Server
https://support.citrix.com/s/article/CTX691646-xenserver-and-citrix-hypervisor-security-update-for-cve202445817  (4.9)

QEMU
https://nvd.nist.gov/vuln/detail/CVE-2024-8354 (4.7)

Draytek Vigor 3910
https://nvd.nist.gov/vuln/detail/CVE-2024-46598 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46597 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46596 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46595 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46594 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46593 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46592 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46591 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46590 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46589 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46588 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46586 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46585 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46584 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46583 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46582 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46581 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46580 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46571 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46568 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46567 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46566 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46565 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46564 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46561 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46560 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46559 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46558 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46557 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46556 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46555 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46554 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46553 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46552 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46551 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2024-46550 (n/a)

IBM Storage Scale
https://www.ibm.com/support/pages/node/7168031 (n/a)

NetBox
https://nvd.nist.gov/vuln/detail/CVE-2024-47226 (n/a)

Technitium
https://nvd.nist.gov/vuln/detail/CVE-2023-49203 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2023-28457 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2023-28456 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2023-28455 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2023-28451 (n/a)