Kwetsbaarheden - Week 41

Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners. Deze selectie wordt gezamenlijk met relevant nieuws verspreid in de Mid of Week.

De inschatting van low/medium/high wordt gemaakt op basis van de CVSS 3.1 base score van de kwetsbaarheid. 0.0-3.9 is low, 4.0-6.9 is medium, 7.0-10.0 is high.
Kwetsbaarheden die als low worden geclassificeerd komen niet in dit overzicht terug.

High

Microsoft Exchange Server
https://nvd.nist.gov/vuln/detail/CVE-2021-26427 (9.0)
https://nvd.nist.gov/vuln/detail/CVE-2021-41348 (8.0)
https://nvd.nist.gov/vuln/detail/CVE-2021-34453 (7.5)

Cisco Intersight Virtual Appliance
https://nvd.nist.gov/vuln/detail/CVE-2021-34748 (8.8)

Cisco Web Security Appliance
https://nvd.nist.gov/vuln/detail/CVE-2021-34698 (8.6)

Microsoft Office
https://advisories.ncsc.nl/advisory?id=NCSC-2021-0883 (8.1-5.3)

IBM PowerVM Hypervisor
https://nvd.nist.gov/vuln/detail/CVE-2021-38923 (8.0)

Microsoft Windows
https://advisories.ncsc.nl/advisory?id=NCSC-2021-0880 (8.0-4.9)

NetApp Cloud Manager
https://nvd.nist.gov/vuln/detail/CVE-2021-27002 (7.5)

Cisco Identity Services Engine (ISE)
https://nvd.nist.gov/vuln/detail/CVE-2021-1594 (7.5)

Apache HTTP Server
https://nvd.nist.gov/vuln/detail/CVE-2021-42013 (7.5)

Microsoft System Center Operations Manager
https://nvd.nist.gov/vuln/detail/CVE-2021-41352 (7.5)

Huawei FusionCompute
https://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20210922-01-cmd-en (7.2)

Cisco AnyConnect
https://nvd.nist.gov/vuln/detail/CVE-2021-34788 (7.0)

Zoho ManageEngine ADManager Plus
https://nvd.nist.gov/vuln/detail/CVE-2021-37931 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37930 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37929 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37928 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37926 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37924 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37923 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37921 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37920 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37762 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37918 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37919 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-37922 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2021-38298 (n/a)

Medium

Kubernetes – Java Client library
https://nvd.nist.gov/vuln/detail/CVE-2021-25738 (6.7)

Microsoft Exchange Server
https://nvd.nist.gov/vuln/detail/CVE-2021-41350 (6.5)

Huawei CloudEngine
https://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20211008-01-cloudengine-en (6.5)

VMWare vRealize Log Insight / Cloud Foundation
https://www.vmware.com/security/advisories/VMSA-2021-0022.html (6.5)

VMWare vRealize Orchestrator
https://www.vmware.com/security/advisories/VMSA-2021-0023.html (6.5)

Cisco Identity Services Engine (ISE)
https://nvd.nist.gov/vuln/detail/CVE-2021-34706 (6.4)
https://nvd.nist.gov/vuln/detail/CVE-2021-34702 (4.3)

Cisco Email Security Appliance
https://nvd.nist.gov/vuln/detail/CVE-2021-1534 (5.8)

Gitlab
https://nvd.nist.gov/vuln/detail/CVE-2021-22263 (5.5)

Cisco DNA Center
https://nvd.nist.gov/vuln/detail/CVE-2021-34782 (4.3)