Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.
Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.
Critical & High
Zyxel USG / USG Flex / ATP / VPN / NSG
https://nvd.nist.gov/vuln/detail/CVE-2022-0342 (9.8)
Spring Framework
https://nvd.nist.gov/vuln/detail/CVE-2022-22965 (9.8)
Spring Cloud Function
https://nvd.nist.gov/vuln/detail/CVE-2022-22963 (9.8)
Fortinet FortiWAN
https://fortiguard.fortinet.com/psirt/FG-IR-21-062 (9.6)
https://fortiguard.fortinet.com/psirt/FG-IR-21-065 (7.7)
https://fortiguard.fortinet.com/psirt/FG-IR-21-060 (7.0)
GitLab CE/EE
https://nvd.nist.gov/vuln/detail/CVE-2022-1162 (9.1)
https://nvd.nist.gov/vuln/detail/CVE-2022-1175 (8.7)
https://nvd.nist.gov/vuln/detail/CVE-2022-1190 (8.7)
Sophos UTM
https://nvd.nist.gov/vuln/detail/CVE-2022-0386 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2022-0652 (7.8)
Fortinet FortiEDR
https://fortiguard.fortinet.com/psirt/FG-IR-22-019 (8.6)
https://fortiguard.fortinet.com/psirt/FG-IR-22-018 (7.6)
Fortinet FortiClient (Windows)
https://fortiguard.fortinet.com/psirt/FG-IR-21-238 (8.0)
Dell Command | Update / Update
https://nvd.nist.gov/vuln/detail/CVE-2022-24426 (7.8)
Arista EOS
https://nvd.nist.gov/vuln/detail/CVE-2021-28504 (7.5)
Xen Hypervisor
https://nvd.nist.gov/vuln/detail/CVE-2022-26357 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-26358 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-26359 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-26360 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-26361 (n/a)
https://support.citrix.com/article/CTX390511
Zoho ManageEngine ADAudit Plus
https://nvd.nist.gov/vuln/detail/CVE-2022-28219 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-24978 (n/a)
Medium
Fortinet FortiWAN
https://fortiguard.fortinet.com/psirt/FG-IR-21-078 (6.8)
https://fortiguard.fortinet.com/psirt/FG-IR-21-070 (6.2)
https://fortiguard.fortinet.com/psirt/FG-IR-21-064 (5.9)
Fortinet FortiWLC
https://fortiguard.fortinet.com/psirt/FG-IR-21-002 (6.6)
GitLab CE/EE
https://nvd.nist.gov/vuln/detail/CVE-2022-1185 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-1148 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2022-1121 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2022-1120 (4.8)
https://nvd.nist.gov/vuln/detail/CVE-2022-1100 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2022-1193 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2022-1105 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2022-1099 (4.3)
https://nvd.nist.gov/vuln/detail/CVE-2022-1174 (4.3)
Fortinet FortiClient (Linux)
https://fortiguard.fortinet.com/psirt/FG-IR-21-232 (6.1)
https://fortiguard.fortinet.com/psirt/FG-IR-21-226 (4.2)
Sophos Firewall
https://nvd.nist.gov/vuln/detail/CVE-2022-0331 (5.3)
Fortinet FortiEDR
https://fortiguard.fortinet.com/psirt/FG-IR-22-052 (4.0)
Aruba Instant On Switch
https://www.arubanetworks.com/security-advisory/aruba-instant-on-switch-denial-of-service-vulnerabilities/ (n/a)
Xen Hypervisor
https://nvd.nist.gov/vuln/detail/CVE-2022-26356 (n/a)
Zoho ManageEngine SupportCenter Plus
https://nvd.nist.gov/vuln/detail/CVE-2022-25373 (n/a)