Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.
Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.
Critical & High
Cisco Nexus Dashboard
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cmdinj-UvYZrKfr (9.9)
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-ptrce-BUSHLbp (8.8)
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cidvXvyX2wLj (6.3)
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN (6.3)
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc (6.3)
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-tlsvld-FdUF3cpw (5.9)
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-raci-T46k3jnN (5.5)
DrayTek routers
https://www.forescout.com/resources/draybreak-draytek-research/ (9.8-7.8)
Microsoft System Center
https://advisories.ncsc.nl/advisory?id=NCSC-2024-0397 (9.8-5.5)
Zimbra Collaboration
https://nvd.nist.gov/vuln/detail/CVE-2024-45519 (9.8)
Ivanti Connect Secure and Policy Secure
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-and-Policy-Secure-CVE-2024-37404?language=en_US (9.1)
Cisco Small Business RV340 / RV340W / RV345 / RV345P Dual WAN Gigabit VPN Routers
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms (8.8)
Ivanti Endpoint Manager Mobile (EPMM)
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2024-7612 (8.8)
Microsoft Azure
https://advisories.ncsc.nl/advisory?id=NCSC-2024-0393 (8.8-6.6)
Microsoft Windows
https://advisories.ncsc.nl/advisory?id=NCSC-2024-0392 (8.8-5.5)
Canonical Ubuntu Juju
https://nvd.nist.gov/vuln/detail/CVE-2024-7558 (8.6)
https://nvd.nist.gov/vuln/detail/CVE-2024-8038 (7.9)
https://nvd.nist.gov/vuln/detail/CVE-2024-8037 (6.5)
Cisco AnyConnect
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2 (8.6-5.8)
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X (5.8)
Cisco Meraki MX / Z Series
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2 (8.6)
Ivanti Avalanche
https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory (7.5-7.3)
Cacti
https://nvd.nist.gov/vuln/detail/CVE-2024-43362 (7.3)
https://nvd.nist.gov/vuln/detail/CVE-2024-43363 (7.2)
https://nvd.nist.gov/vuln/detail/CVE-2024-43365 (5.7)
https://nvd.nist.gov/vuln/detail/CVE-2024-43364 (5.7)
Jenkins
https://www.jenkins.io/security/advisory/2024-10-02/ (high-medium)
Palo Alto Networks GlobalProtect
https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-palo-alto-networks-globalprotect/ (high)
Medium
Cisco Small Business RV042 / RV042G / RV320 / RV325 Routers
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV (6.8)
Fortinet FortiAnalyzer
https://fortiguard.fortinet.com/psirt/FG-IR-24-196 (6.8)
Cisco Identity Services Engine (ISE)
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-ZYF2nEEX (6.5)
Cisco Expressway Series
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expw-escalation-3bkz77bD (6.0)
Redis
https://nvd.nist.gov/vuln/detail/CVE-2024-31228 (5.5)
https://nvd.nist.gov/vuln/detail/CVE-2024-31227 (4.4)
Zoom Workplace Apps
https://www.zoom.com/en/trust/security-bulletin/zsb-24037/ (4.9)
https://www.zoom.com/en/trust/security-bulletin/zsb-24038/ (4.9)