Kwetsbaarheden - Week 47

Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.

Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.

Critical & High

Palo Alto Networks PAN-OS software
https://security.paloaltonetworks.com/CVE-2024-0012 (9.3-5.9)
https://security.paloaltonetworks.com/CVE-2024-2550 (8.7)
https://security.paloaltonetworks.com/CVE-2024-9472 (8.7)
https://security.paloaltonetworks.com/CVE-2024-9474 (6.9-5.9)
https://security.paloaltonetworks.com/CVE-2024-2552 (6.8)
https://security.paloaltonetworks.com/CVE-2024-2551 (6.6)
https://security.paloaltonetworks.com/CVE-2024-5917 (6.3)
https://security.paloaltonetworks.com/CVE-2024-5918 (5.3)
https://security.paloaltonetworks.com/CVE-2024-5919 (5.1)
https://security.paloaltonetworks.com/CVE-2024-5920 (4.6)

Jenkins diverse plugins
https://www.jenkins.io/security/advisory/2024-11-13/ (8.8-4.3)

GitLab CE/EE
https://about.gitlab.com/releases/2024/11/13/patch-release-gitlab-17-5-… (8.5-5.3)

Nextcloud Mail
https://github.com/nextcloud/security-advisories/security/advisories/GH… (8.2)

IBM Security SOAR
https://nvd.nist.gov/vuln/detail/CVE-2024-45670 (8.1)

Trend Micro Deep Security Agent
https://nvd.nist.gov/vuln/detail/CVE-2024-51503 (8.0)

IBM Sterling Secure Proxy
https://nvd.nist.gov/vuln/detail/CVE-2024-41784 (7.5)

LibreNMS
https://nvd.nist.gov/vuln/detail/CVE-2024-49754 (7.4)
https://nvd.nist.gov/vuln/detail/CVE-2024-51495 (5.4)
https://nvd.nist.gov/vuln/detail/CVE-2024-51497 (5.4)
https://nvd.nist.gov/vuln/detail/CVE-2024-51494 (5.4)
https://nvd.nist.gov/vuln/detail/CVE-2024-49759 (5.4)
https://nvd.nist.gov/vuln/detail/CVE-2024-49764 (5.4)
https://nvd.nist.gov/vuln/detail/CVE-2024-50350 (5.4)
https://nvd.nist.gov/vuln/detail/CVE-2024-50352 (5.4)
https://nvd.nist.gov/vuln/detail/CVE-2024-51496 (4.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-52526 (4.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-49758 (4.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-50351 (4.8)
https://nvd.nist.gov/vuln/detail/CVE-2024-50355 (4.8)

Dell PowerProtect Cyber Recovery
https://www.dell.com/support/kbdoc/en-us/000247709/dsa-2024-435-securit… (7.2-6.5)

Medium

Arista EOS
https://www.arista.com/en/support/advisories-notices/security-advisory/… (6.5)
https://www.arista.com/en/support/advisories-notices/security-advisory/… (4.3)

Nextcloud Tables
https://github.com/nextcloud/security-advisories/security/advisories/GH… (6.3)

Nextcloud Desktop
https://github.com/nextcloud/security-advisories/security/advisories/GH… (5.9)
https://github.com/nextcloud/security-advisories/security/advisories/GH… (4.2)

Nextcloud Server / Enterprise Server
https://github.com/nextcloud/security-advisories/security/advisories/GH… (5.7)
https://github.com/nextcloud/security-advisories/security/advisories/GH… (5.7)
https://github.com/nextcloud/security-advisories/security/advisories/GH… (4.6)
https://github.com/nextcloud/security-advisories/security/advisories/GH… (4.6)
https://github.com/nextcloud/security-advisories/security/advisories/GH… (4.4)
https://github.com/nextcloud/security-advisories/security/advisories/GH… (4.1)

Grafana OSS and Enterprise
https://nvd.nist.gov/vuln/detail/CVE-2024-9476 (5.1)

Apache Traffic Server
https://nvd.nist.gov/vuln/detail/CVE-2024-50306 (n/a)

Zimbra Collaboration
https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.11#Security_Fixes (n/a)