Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.
Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.
Critical & High
Cisco Wireless LAN Controller Management Interface
https://nvd.nist.gov/vuln/detail/CVE-2022-20695 (10.0)
ThinVNC
https://nvd.nist.gov/vuln/detail/CVE-2022-25226 (10.0)
VMWare vCloud Director
https://nvd.nist.gov/vuln/detail/CVE-2022-22966 (9.1)
Dell OpenManage Enterpise
https://www.dell.com/support/kbdoc/nl-nl/000197800/dsa-2022-077 (9.0)
Amazon AWS Log4j Hotpatch package
https://nvd.nist.gov/vuln/detail/CVE-2021-3100 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2022-0070 (8.8)
https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/
Bottlerocket Hotdog
https://nvd.nist.gov/vuln/detail/CVE-2021-3101 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2022-0071 (8.8)
https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/
Juniper Networks Junos OS
J-Web
https://nvd.nist.gov/vuln/detail/CVE-2022-22182 (8.8)
https://nvd.nist.gov/vuln/detail/CVE-2022-22181 (8.0)
SRX Series
https://nvd.nist.gov/vuln/detail/CVE-2022-22185 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-22198 (7.5)
MX Series
https://nvd.nist.gov/vuln/detail/CVE-2022-22198 (7.5)
EX4600
https://nvd.nist.gov/vuln/detail/CVE-2022-22188 (7.5)
EX4650
https://nvd.nist.gov/vuln/detail/CVE-2022-22188 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-22186 (7.2)
QFX Series
https://nvd.nist.gov/vuln/detail/CVE-2022-22188 (7.5)
Cisco Embedded Wireless Controller
https://nvd.nist.gov/vuln/detail/CVE-2022-20622 (8.6)
Cisco IOS XR
https://nvd.nist.gov/vuln/detail/CVE-2022-20714 (8.6)
Cisco IOS XE
https://nvd.nist.gov/vuln/detail/CVE-2022-20678 (8.6)
Catalyst 9000 Family
https://nvd.nist.gov/vuln/detail/CVE-2022-20681 (7.8)
Cisco SD-WAN
https://nvd.nist.gov/vuln/detail/CVE-2022-20716 (7.8)
https://nvd.nist.gov/vuln/detail/CVE-2022-20739 (7.3)
Juniper Networks Juniper Identity Management Services (JIMS)
https://nvd.nist.gov/vuln/detail/CVE-2022-22187 (7.8)
Juniper Networks Contrail Service Orchestration (CSO)
https://nvd.nist.gov/vuln/detail/CVE-2022-22189 (7.8)
Oracle VM VirtualBox
https://nvd.nist.gov/vuln/detail/CVE-2022-21491 (7.8)
Juniper Networks Junos OS Evolved
https://nvd.nist.gov/vuln/detail/CVE-2022-22183 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-22195 (7.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-22197 (7.5)
PTX10003 / PTX1000 / PTX10008
https://nvd.nist.gov/vuln/detail/CVE-2022-22194 (7.5)
Juniper Networks Paragon Active Assurance Control Center
https://nvd.nist.gov/vuln/detail/CVE-2022-22190 (7.4)
Cisco 1000 Series Connected Grid Router
https://nvd.nist.gov/vuln/detail/CVE-2022-20761
Amazon AWS VPN Client
https://nvd.nist.gov/vuln/detail/CVE-2022-25165 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-25166 (n/a)
Zoho ManageEngine ADSelfService Plus
https://nvd.nist.gov/vuln/detail/CVE-2022-28810 (n/a)
Zoho ManageEngine OpManager
https://nvd.nist.gov/vuln/detail/CVE-2022-27908 (n/a)
Medium
Cisco IOS XR
https://nvd.nist.gov/vuln/detail/CVE-2022-20758 (6.8)
Cisco Catalyst Digital Building Series Switches / Catalyst Micro Switches
https://nvd.nist.gov/vuln/detail/CVE-2022-20731 (6.8)
https://nvd.nist.gov/vuln/detail/CVE-2022-20661 (4.6)
Oracle VM VirtualBox
https://nvd.nist.gov/vuln/detail/CVE-2022-21465 (6.7)
https://nvd.nist.gov/vuln/detail/CVE-2022-21471 (6.5)
Juniper Networks Junos OS
https://nvd.nist.gov/vuln/detail/CVE-2022-22196 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-22193 (5.5)
EX4300
https://nvd.nist.gov/vuln/detail/CVE-2022-22191 (6.5)
Juniper Networks Junos OS Evolved
https://nvd.nist.gov/vuln/detail/CVE-2022-22196 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-22193 (5.5)
Palo Alto Networks PAN-OS (DNS Proxy)
https://nvd.nist.gov/vuln/detail/CVE-2022-0023 (5.9)
Cisco IOx Application Hosting Environment
https://nvd.nist.gov/vuln/detail/CVE-2022-20718 (5.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-20719 (5.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-20720 (5.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-20723 (5.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-20725 (5.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-20724 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2022-20726 (5.3)
https://nvd.nist.gov/vuln/detail/CVE-2022-20677 (5.1)
https://nvd.nist.gov/vuln/detail/CVE-2022-20727 (5.1)
https://nvd.nist.gov/vuln/detail/CVE-2022-20721 (4.9)
https://nvd.nist.gov/vuln/detail/CVE-2022-20722 (4.9)
Cisco SD-WAN
https://nvd.nist.gov/vuln/detail/CVE-2022-20747 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-20735 (6.5)
https://nvd.nist.gov/vuln/detail/CVE-2022-20717 (5.5)
Veritas NetBackup OpsCenter / OpsCenter Analytics
https://nvd.nist.gov/vuln/detail/CVE-2021-41570 (5.4)
MISP
https://www.misp-project.org/2022/04/20/MISP.2.4.158.released.html/ (n/a)
Lenovo Notebook BIOS
https://support.lenovo.com/nl/en/product_security/len-73440 (n/a)
Zoho ManageEngine Remote Access Plus
https://nvd.nist.gov/vuln/detail/CVE-2022-26777 (n/a)
https://nvd.nist.gov/vuln/detail/CVE-2022-26653 (n/a)