Snapshot
Feb. 3, 2023 - Feb. 10, 2023
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2023-0669 | Fortra (formerly, HelpSystems) GoAnywhere MFT contains a pre-authentication remote code execution vulnerability in the License Response Servlet due to deserializing an attacker-controlled object. | N/A | Fortra | Feb. 10, 2023 |
CVE-2015-2291 | Intel ethernet diagnostics driver for Windows IQVW32.sys and IQVW64.sys contain an unspecified vulnerability that allows for a denial-of-service. | HIGH | Intel | Feb. 10, 2023 |
CVE-2022-24990 | TerraMaster OS contains a remote command execution vulnerability that allows an unauthenticated user to execute commands on the target endpoint. | N/A | TerraMaster | Feb. 10, 2023 |
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2021-20038 (3) | A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a rem... | CRITICAL | Sonicwall |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CVE-2021-21974 (19) | OpenSLP as used in ESXi has a heap-overflow vulnerability. | HIGH | Vmware |
Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CVE-2021-38003 (2) | Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit he... | HIGH |
CISA Known Exploited Remote Code Execution Public Exploits Available |
|
CVE-2023-0286 (4) | There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. | N/A |
Remote Code Execution |
|
CVE-2022-24990 (3) | TerraMaster NAS 4.2.29 and earlier allows remote attackers to discover the administrative password by sending "User-Agent: TN... | N/A | Terramaster |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added three vulnerabilities to the known exploited vulnerabilities list.
Fortra — GoAnywhere MFT |
CVE-2023-0669 / Added: Feb. 10, 2023 |
CVSS Not Assigned |
Fortra (formerly, HelpSystems) GoAnywhere MFT contains a pre-authentication remote code execution vulnerability in the License Response Servlet due to deserializing an attacker-controlled object. |
Headlines |
Intel — Ethernet Diagnostics Driver for Windows |
CVE-2015-2291 / Added: Feb. 10, 2023 |
HIGH CVSS 7.20 |
Intel ethernet diagnostics driver for Windows IQVW32.sys and IQVW64.sys contain an unspecified vulnerability that allows for a denial-of-service. |
Headlines
|
TerraMaster — TerraMaster OS |
CVE-2022-24990 / Added: Feb. 10, 2023 |
CVSS Not Assigned |
TerraMaster OS contains a remote command execution vulnerability that allows an unauthenticated user to execute commands on the target endpoint. |
Headlines |
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2021-20038 |
CRITICAL CVSS 9.80 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Dec. 8, 2021 |
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions. |
Vendor Impacted: Sonicwall |
Products Impacted: Sma 400 Firmware, Sma 200 Firmware, Sma 500v Firmware, Sma 100 Appliances, Sma 210 Firmware, Sma 410 Firmware |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2021-21974 |
HIGH CVSS 8.80 |
Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Feb. 24, 2021 |
OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution. |
Vendor Impacted: Vmware |
Product Impacted: Esxi |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2021-38003 |
HIGH CVSS 8.80 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Nov. 23, 2021 |
Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
Vendor Impacted: Google |
Product Impacted: Chromium V8 Engine |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-0286 |
CVSS Not Assigned |
Remote Code Execution |
Published: Feb. 8, 2023 |
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-24990 |
CVSS Not Assigned |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Feb. 7, 2023 |
TerraMaster NAS 4.2.29 and earlier allows remote attackers to discover the administrative password by sending "User-Agent: TNAS" to module/api.php?mobile/webNasIPS and then reading the PWD field in the response. |
Vendor Impacted: Terramaster |
Product Impacted: Terramaster Os |
Quotes
|
Headlines |
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.