Snapshot
Feb. 17, 2023 - Feb. 24, 2023
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2022-47986 | IBM Aspera Faspex could allow a remote attacker to execute code on the system, caused by a YAML deserialization flaw. | CRITICAL | IBM | Feb. 21, 2023 |
CVE-2022-41223 | The Director component in Mitel MiVoice Connect allows an authenticated attacker with internal network access to execute code within the context of the application. | MEDIUM | Mitel | Feb. 21, 2023 |
CVE-2022-40765 | The Mitel Edge Gateway component of MiVoice Connect allows an authenticated attacker with internal network access to execute commands within the context of the system. | MEDIUM | Mitel | Feb. 21, 2023 |
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2022-39952 (13) | A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 ... | CRITICAL |
Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
|
CVE-2021-42756 (5) | Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the proxy daemon of FortiWeb 5.x all versions, 6.0.7 and be... | CRITICAL |
Actively Exploited Remote Code Execution |
|
CVE-2022-42475 (4) | A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 throu... | CRITICAL | Fortinet |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CVE-2022-40765 (3) | A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 could allow an authenticated attacker wi... | MEDIUM | Mitel |
CISA Known Exploited Actively Exploited |
CVE-2023-20858 (5) | VMware Carbon Black App Control 8.7.x prior to 8.7.8, 8.8.x prior to 8.8.6, and 8.9.x.prior to 8.9.4 contain an injection vul... | N/A |
Used In Ransomware |
|
CVE-2023-20855 (4) | VMware vRealize Orchestrator contains an XML External Entity vulnerability. | N/A | Risk Context N/A |
CISA Known Exploited Vulnerabilities
CISA added three vulnerabilities to the known exploited vulnerabilities list.
IBM — Aspera Faspex |
CVE-2022-47986 / Added: Feb. 21, 2023 |
CRITICAL CVSS 9.80 |
IBM Aspera Faspex could allow a remote attacker to execute code on the system, caused by a YAML deserialization flaw. |
Headlines
|
Mitel — MiVoice Connect |
CVE-2022-41223 / Added: Feb. 21, 2023 |
MEDIUM CVSS 6.80 |
The Director component in Mitel MiVoice Connect allows an authenticated attacker with internal network access to execute code within the context of the application. |
Headlines |
Mitel — MiVoice Connect |
CVE-2022-40765 / Added: Feb. 21, 2023 |
MEDIUM CVSS 6.80 |
The Mitel Edge Gateway component of MiVoice Connect allows an authenticated attacker with internal network access to execute commands within the context of the system. |
Headlines |
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2022-39952 |
CRITICAL CVSS 9.80 |
Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Feb. 16, 2023 |
A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP request. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2021-42756 |
CRITICAL CVSS 9.80 |
Actively Exploited Remote Code Execution |
Published: Feb. 16, 2023 |
Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the proxy daemon of FortiWeb 5.x all versions, 6.0.7 and below, 6.1.2 and below, 6.2.6 and below, 6.3.16 and below, 6.4 all versions may allow an unauthenticated remote attacker to achieve arbitrary code execution via specifically crafted HTTP requests. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-42475 |
CRITICAL CVSS 9.80 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Jan. 2, 2023 |
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. |
Vendor Impacted: Fortinet |
Products Impacted: Fpm-7620f, Fortigate-6601f, Fim-7910e, Fortigate-7121f, Fortigate-7040e, Fortigate-6501f-Dc, Fortigate-7030e, Fpm-7630e, Fortigate-6501f, Fortiproxy, Fim-7921f, Fpm-7620e, Fortigate-6300f, Fortigate-7060e, Fortios, Fortigate-6601f-Dc, Fim-7904e, Fortigate-6300f-Dc, Fortigate-6500f, Fim-7920e, Fortigate-6500f-Dc, Fim-7901e, Fim-7941f |
Headlines
|
Back to top ↑ |
CVE-2022-40765 |
MEDIUM CVSS 6.80 |
CISA Known Exploited Actively Exploited |
Published: Nov. 22, 2022 |
A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker with internal network access to conduct a command-injection attack, due to insufficient restriction of URL parameters. |
Vendor Impacted: Mitel |
Product Impacted: Mivoice Connect |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-20858 |
CVSS Not Assigned |
Used In Ransomware |
Published: Feb. 22, 2023 |
VMware Carbon Black App Control 8.7.x prior to 8.7.8, 8.8.x prior to 8.8.6, and 8.9.x.prior to 8.9.4 contain an injection vulnerability. A malicious actor with privileged access to the App Control administration console may be able to use specially crafted input allowing access to the underlying server operating system. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-20855 |
CVSS Not Assigned |
Risk Context N/A |
Published: Feb. 22, 2023 |
VMware vRealize Orchestrator contains an XML External Entity (XXE) vulnerability. A malicious actor, with non-administrative access to vRealize Orchestrator, may be able to use specially crafted input to bypass XML parsing restrictions leading to access to sensitive information or possible escalation of privileges. |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.