Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners. Deze selectie wordt gezamenlijk met relevant nieuws verspreid in de Mid of Week.
De inschatting van low/medium/high wordt gemaakt op basis van de CVSS 3.1 base score van de kwetsbaarheid. 0.0-3.9 is low, 4.0-6.9 is medium, 7.0-10.0 is high.
Kwetsbaarheden die als low worden geclassificeerd komen niet in dit overzicht terug.
High
Gitlab
https://nvd.nist.gov/vuln/detail/CVE-2021-39885 (8.7)
https://nvd.nist.gov/vuln/detail/CVE-2021-39877 (7.7)
Fortinet FortiClientEMS
https://www.fortiguard.com/psirt/FG-IR-20-072 (7.9)
Hitachi Content Platform Anywhere
https://nvd.nist.gov/vuln/detail/CVE-2021-41573 (7.5)
Zoho ManageEngine Remote Access Plus
https://nvd.nist.gov/vuln/detail/CVE-2021-41827 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2021-41828 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2021-41829 (7.5)
Zoho ManageEngine OpManager
https://nvd.nist.gov/vuln/detail/CVE-2021-41288 (n/a)
Forcepoint NGFW Engine
https://nvd.nist.gov/vuln/detail/CVE-2021-41530 (n/a)
Apache HTTP server
https://nvd.nist.gov/vuln/detail/CVE-2021-41773 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-41524 (n/a)
Medium
Gitlab
https://nvd.nist.gov/vuln/detail/CVE-2021-22264 (6.8)
https://nvd.nist.gov/vuln/detail/CVE-2021-39869 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2021-39867 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2021-39872 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2021-39891 (5.9)
https://nvd.nist.gov/vuln/detail/CVE-2021-39866 (5.4)
https://nvd.nist.gov/vuln/detail/CVE-2021-39894 (5.4)
https://nvd.nist.gov/vuln/detail/CVE-2021-22257 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39893 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39882 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39875 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-22258 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39870 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39889 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39873 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39871 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39868 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-22259 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39883 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39874 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39888 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2021-39884 (4.3)
Fortinet FortiSandbox
https://www.fortiguard.com/psirt/FG-IR-20-234 (6.4)
Docker Moby
https://nvd.nist.gov/vuln/detail/CVE-2021-41091 (6.3)
containerd
https://nvd.nist.gov/vuln/detail/CVE-2021-41103 (5.9)
Docker
https://nvd.nist.gov/vuln/detail/CVE-2021-41092 (5.4)
Fortinet FortiAnalyzer
https://www.fortiguard.com/psirt/FG-IR-20-098 (4.2)
Fortinet FortiSDNConnector
https://www.fortiguard.com/psirt/FG-IR-20-183 (4.2)
Fortinet FortiWebManager
https://www.fortiguard.com/psirt/FG-IR-20-027 (4.0)