Kwetsbaarheden - Week 49

Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.

Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.

Critical & High

AMI MegaRAC Baseboard Management Controller (BMC)
https://nvd.nist.gov/vuln/detail/CVE-2022-40259 (9.8)
https://nvd.nist.gov/vuln/detail/CVE-2022-40242 (9.8)
https://nvd.nist.gov/vuln/detail/CVE-2022-2827 (7.5)

Cacti
https://nvd.nist.gov/vuln/detail/CVE-2022-46169 (9.8)

Veritas NetBackup Flex Scale
https://www.veritas.com/content/support/en_US/security/VTS22-019 (9.8-8.8)

Sophos Firewall
https://www.sophos.com/en-us/security-advisories/sophos-sa-20221201-sfo… (9.8-4.3)

Aruba ClearPass Policy Manager
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-020.txt (8.8-5.5)

Kubernetes Capsule
https://nvd.nist.gov/vuln/detail/CVE-2022-46167 (8.8)

Ubiquiti EdgeRouter
https://nvd.nist.gov/vuln/detail/CVE-2022-43553 (8.8)

FortiNet FortiOS
https://nvd.nist.gov/vuln/detail/CVE-2022-35843 (8.1)
https://nvd.nist.gov/vuln/detail/CVE-2022-40680 (4.0)

Ivanti Endpoint Manager Client
https://nvd.nist.gov/vuln/detail/CVE-2022-27773 (7.8)
https://nvd.nist.gov/vuln/detail/CVE-2022-35259 (7.5)

Ivanti Connect Secure (ICS) / Policy Secure (IPS)
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA45520/?… (7.5-6.5)

Xen
https://nvd.nist.gov/vuln/detail/CVE-2022-3643 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-42328 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-42329 (n/a) 

Zimbra Collaboration (ZCS)
https://nvd.nist.gov/vuln/detail/CVE-2022-45912 (n/a)

Medium

Trellix Agent (TA) for Windows
https://nvd.nist.gov/vuln/detail/CVE-2022-3859 (6.7)

GitHub Enterprise Server
https://nvd.nist.gov/vuln/detail/CVE-2022-23737 (6.5)

VMware Tools for Windows
https://nvd.nist.gov/vuln/detail/CVE-2021-31693 (6.5)

Zabbix
https://nvd.nist.gov/vuln/detail/CVE-2022-43516 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-43515 (5.3)

Micro Focus NetIQ
https://nvd.nist.gov/vuln/detail/CVE-2022-38753 (6.3)

Fortinet FortiADC
https://nvd.nist.gov/vuln/detail/CVE-2022-33875 (5.4)
https://nvd.nist.gov/vuln/detail/CVE-2022-33876 (5.4)

NETGEAR Nighthawk (RAX30 AX2400) routers
https://www.tenable.com/security/research/tra-2022-36 (5.3)

Nextcloud Server
https://nvd.nist.gov/vuln/detail/CVE-2022-41968 (5.3)

CrowdStrike Falcon
https://nvd.nist.gov/vuln/detail/CVE-2022-44721 (4.9)

Nextcloud Talk (Android)
https://nvd.nist.gov/vuln/detail/CVE-2022-41971 (4.8)

Zyxel ZyWALL/USG / VPN / USG FLEX / ATP
https://nvd.nist.gov/vuln/detail/CVE-2022-40603 (4.7)

Check Point IPSec VPN Software Blade
https://nvd.nist.gov/vuln/detail/CVE-2022-23746 (n/a)

Proxmox Virtual Environment (PVE) / Mail Gateway (PMG)
https://nvd.nist.gov/vuln/detail/CVE-2022-35507 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-35508 (n/a)