Kwetsbaarheden - Week 16

Het CSIRT-DSP maakt op wekelijkse basis een selectie van kwetsbaarheden, waarbij het CSIRT-DSP de inschatting heeft gemaakt dat deze relevant zijn voor digitale dienstverleners.

Het betreft een selectie van 'Medium' en 'High' kwetsbaarheden. Voor de inschatting hiervan wordt er gebruik gemaakt van de CVSS 3.1 base scores indien deze beschikbaar zijn. Indien deze niet beschikbaar zijn, zal dit worden aangegeven met 'n/a'.

Critical & High

Cisco Wireless LAN Controller Management Interface

https://nvd.nist.gov/vuln/detail/CVE-2022-20695 (10.0)

ThinVNC

https://nvd.nist.gov/vuln/detail/CVE-2022-25226 (10.0)

VMWare vCloud Director

https://nvd.nist.gov/vuln/detail/CVE-2022-22966 (9.1)

Dell OpenManage Enterpise

https://www.dell.com/support/kbdoc/nl-nl/000197800/dsa-2022-077 (9.0)

Amazon AWS Log4j Hotpatch package

https://nvd.nist.gov/vuln/detail/CVE-2021-3100 (8.8)

https://nvd.nist.gov/vuln/detail/CVE-2022-0070 (8.8)

https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/

Bottlerocket Hotdog

https://nvd.nist.gov/vuln/detail/CVE-2021-3101 (8.8)

https://nvd.nist.gov/vuln/detail/CVE-2022-0071 (8.8)

https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/

Juniper Networks Junos OS

J-Web

https://nvd.nist.gov/vuln/detail/CVE-2022-22182 (8.8)

https://nvd.nist.gov/vuln/detail/CVE-2022-22181 (8.0)

SRX Series

https://nvd.nist.gov/vuln/detail/CVE-2022-22185 (7.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-22198 (7.5)

MX Series

https://nvd.nist.gov/vuln/detail/CVE-2022-22198 (7.5)

EX4600

https://nvd.nist.gov/vuln/detail/CVE-2022-22188 (7.5)

EX4650

https://nvd.nist.gov/vuln/detail/CVE-2022-22188 (7.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-22186 (7.2)

QFX Series

https://nvd.nist.gov/vuln/detail/CVE-2022-22188 (7.5)

Cisco Embedded Wireless Controller

https://nvd.nist.gov/vuln/detail/CVE-2022-20622 (8.6)

Cisco IOS XR

https://nvd.nist.gov/vuln/detail/CVE-2022-20714 (8.6)

Cisco IOS XE

https://nvd.nist.gov/vuln/detail/CVE-2022-20678 (8.6)

Catalyst 9000 Family

https://nvd.nist.gov/vuln/detail/CVE-2022-20681 (7.8)

Cisco SD-WAN

https://nvd.nist.gov/vuln/detail/CVE-2022-20716 (7.8)

https://nvd.nist.gov/vuln/detail/CVE-2022-20739 (7.3)

Juniper Networks Juniper Identity Management Services (JIMS)

https://nvd.nist.gov/vuln/detail/CVE-2022-22187 (7.8)

Juniper Networks Contrail Service Orchestration (CSO)

https://nvd.nist.gov/vuln/detail/CVE-2022-22189 (7.8)

Oracle VM VirtualBox

https://nvd.nist.gov/vuln/detail/CVE-2022-21491 (7.8)

Juniper Networks Junos OS Evolved

https://nvd.nist.gov/vuln/detail/CVE-2022-22183 (7.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-22195 (7.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-22197 (7.5)

PTX10003 / PTX1000 / PTX10008

https://nvd.nist.gov/vuln/detail/CVE-2022-22194 (7.5)

Juniper Networks Paragon Active Assurance Control Center

https://nvd.nist.gov/vuln/detail/CVE-2022-22190 (7.4)

Cisco 1000 Series Connected Grid Router

https://nvd.nist.gov/vuln/detail/CVE-2022-20761

Amazon AWS VPN Client

https://nvd.nist.gov/vuln/detail/CVE-2022-25165 (n/a)

https://nvd.nist.gov/vuln/detail/CVE-2022-25166 (n/a)

Zoho ManageEngine ADSelfService Plus

https://nvd.nist.gov/vuln/detail/CVE-2022-28810 (n/a)

Zoho ManageEngine OpManager

https://nvd.nist.gov/vuln/detail/CVE-2022-27908 (n/a)

Medium

Cisco IOS XR

https://nvd.nist.gov/vuln/detail/CVE-2022-20758 (6.8)

Cisco Catalyst Digital Building Series Switches / Catalyst Micro Switches

https://nvd.nist.gov/vuln/detail/CVE-2022-20731 (6.8)

https://nvd.nist.gov/vuln/detail/CVE-2022-20661 (4.6)

Oracle VM VirtualBox

https://nvd.nist.gov/vuln/detail/CVE-2022-21465 (6.7)

https://nvd.nist.gov/vuln/detail/CVE-2022-21471 (6.5)

Juniper Networks Junos OS

https://nvd.nist.gov/vuln/detail/CVE-2022-22196 (6.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-22193 (5.5)

EX4300

https://nvd.nist.gov/vuln/detail/CVE-2022-22191 (6.5)

Juniper Networks Junos OS Evolved

https://nvd.nist.gov/vuln/detail/CVE-2022-22196 (6.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-22193 (5.5)

Palo Alto Networks PAN-OS (DNS Proxy)

https://nvd.nist.gov/vuln/detail/CVE-2022-0023 (5.9)

Cisco IOx Application Hosting Environment

https://nvd.nist.gov/vuln/detail/CVE-2022-20718 (5.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-20719 (5.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-20720 (5.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-20723 (5.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-20725 (5.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-20724 (5.3)

https://nvd.nist.gov/vuln/detail/CVE-2022-20726 (5.3)

https://nvd.nist.gov/vuln/detail/CVE-2022-20677 (5.1)

https://nvd.nist.gov/vuln/detail/CVE-2022-20727 (5.1)

https://nvd.nist.gov/vuln/detail/CVE-2022-20721 (4.9)

https://nvd.nist.gov/vuln/detail/CVE-2022-20722 (4.9)

Cisco SD-WAN

https://nvd.nist.gov/vuln/detail/CVE-2022-20747 (6.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-20735 (6.5)

https://nvd.nist.gov/vuln/detail/CVE-2022-20717 (5.5)

Veritas NetBackup OpsCenter / OpsCenter Analytics

https://nvd.nist.gov/vuln/detail/CVE-2021-41570 (5.4)

MISP

https://www.misp-project.org/2022/04/20/MISP.2.4.158.released.html/ (n/a)

Lenovo Notebook BIOS

https://support.lenovo.com/nl/en/product_security/len-73440 (n/a)

Zoho ManageEngine Remote Access Plus

https://nvd.nist.gov/vuln/detail/CVE-2022-26777 (n/a)

https://nvd.nist.gov/vuln/detail/CVE-2022-26653 (n/a)