Skip to main content

CND News and Blog

New Vulnerabilities Friday 16 December


New Alerts for VMware, NetApp, Shibboleth, Samba, and Tenable.

VMware 

vRealize Network Insight (vRNI) contain command injection and directory traversal vulnerabilities present in the vRNI REST API. A remote attacker can execute commands and read arbitrary files. Highest CVSSv3 score of 9.8
More info.

VMware Workspace ONE Access and Identity Manager contain a broken authentication vulnerability. A remote attacker can obtain system information due to an unauthenticated endpoint. CVSSv3 score of 5.3
More info.

NetApp 

NetApp has published 10 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 9.8. Only 1 has patches.
More info.

Shibboleth 

Older releases of the Shibboleth Identity Provider and OpenSAML-Java library are potentially vulnerable to attacks ranging from DoS to RCE when given specially-crafted encrypted XML to decrypt. Some decryption use cases include unauthenticated message processing, so are widely accessible.
More info.

Samba 

Samba has published several bulletins addressing vulnerabilities in rc4-hmac in Kerberos.
More info.

Tenable 

Tenable.ad uses Erlang, which was found to contain vulnerabilities. CVSSv3 score of 9.8
More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 19 April 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/