Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.
Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.
Critical & High
HPE Integrated Lights-Out 6 (iLO 6) / 5 (iLO 5) / 4 (iLO 4)
https://nvd.nist.gov/vuln/detail/CVE-2023-28083 (8.3)
IBM Spectrum Scale
https://nvd.nist.gov/vuln/detail/CVE-2020-4927 (8.2)
KubeVirt
https://nvd.nist.gov/vuln/detail/CVE-2023-26484 (8.2)
Dell EMC Unisphere for PowerMax / Unisphere for PowerMax Virtual Appliance / PowerMax OS
https://nvd.nist.gov/vuln/detail/CVE-2021-21548 (7.4)
OTRS
https://nvd.nist.gov/vuln/detail/CVE-2023-1250 (7.4)
https://nvd.nist.gov/vuln/detail/CVE-2023-1248 (6.1)
Aruba CX Switch Series / AOS-CX Network Analytics Engine
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-004.txt (7.2)
Zoom Client for IT Admin Windows
https://nvd.nist.gov/vuln/detail/CVE-2023-22883 (7.2)
Array Networks Array AG Series / vxAG
https://nvd.nist.gov/vuln/detail/CVE-2023-28461 (critical)
Array Networks APV
https://nvd.nist.gov/vuln/detail/CVE-2023-28460 (high)
Jenkins diverse plugins
https://www.jenkins.io/security/advisory/2023-03-21/ (high-medium)
Xen
https://nvd.nist.gov/vuln/detail/CVE-2022-42331 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-42332 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-42333 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-42334 (n/a)
Medium
Zoom for Windows / Rooms for Windows / VDI for Windows
https://nvd.nist.gov/vuln/detail/CVE-2023-22880 (6.8)
Cilium
https://nvd.nist.gov/vuln/detail/CVE-2023-27595 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-27593 (4.4)
https://nvd.nist.gov/vuln/detail/CVE-2023-27594 (4.2)
Zoom
https://nvd.nist.gov/vuln/detail/CVE-2023-22881 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-22882 (6.5)
Redis
https://nvd.nist.gov/vuln/detail/CVE-2023-28425 (5.5)
Watchdog Anti-Virus
https://nvd.nist.gov/vuln/detail/CVE-2023-1446 (5.5)
https://nvd.nist.gov/vuln/detail/CVE-2023-1453 (4.4)
HashiCorp Nomad / Nomad Enterprise
https://nvd.nist.gov/vuln/detail/CVE-2023-1296 (5.3)
HPE FlexFabric 5700 Switch Series
https://nvd.nist.gov/vuln/detail/CVE-2022-37940 (5.3)
Roxy-WI
https://nvd.nist.gov/vuln/detail/CVE-2023-25804 (5.3)
Tribe29 Checkmk
https://nvd.nist.gov/vuln/detail/CVE-2023-22288 (4.1)
Dnsmasq
https://nvd.nist.gov/vuln/detail/CVE-2023-28450 (n/a)
OpenSSH
https://nvd.nist.gov/vuln/detail/CVE-2023-28531 (n/a)
pfSense
https://nvd.nist.gov/vuln/detail/CVE-2023-27253 (n/a)