Skip to main content

CND News and Blog

New Vulnerabilities Friday 17 October


New Alerts for Moxa, Squid, Westermo, SICK, LANCOM, NetApp, and Linux.

Oracle has published their Pre-Release bulletin for Tuesday's Quarterly Patches. More info.


Moxa

Moxa is reporting 5 vulnerabilities in their Network Security Appliances and Routers, 3 rated Critical, 1 rated High, and 1 rated Medium. Highest CVSSv4 score of 9.9
More info.

Squid

Due to a failure to redact HTTP Authentication credentials Squid is vulnerable to an Information Disclosure attack. CVSSv3 score of 10.
More info.

Westermo

Westermo has published 3 new bulletins, 1 of which allows a remote attacker to obtain sensitive information. Highest CVSSv3 score of 8.2
More info.

SICK

SICK has published 2 new bulletins, 1 for Endress+Hauser, and 1 affecting Enterprise Analytics and Logistic
Analytics Products. Highest CVSSv3 score for the SICK product bulletin is 7.5
More info.

LANCOM

LANCOM R&S Firewalls use Redis, that has a Critical vulnerability with a CVSSv3 score of 10. LANCOM states the way Redis is used minimizes the risk to their Firewalls.
More info.

NetApp

NetApp has published 14 new bulletins identifying vulnerabilities in third-party software included in their products, 12 rated High and 2 rated Low. Highest CVSSv3 score of 8.2
More info.

Linux

SUSE has updated the kernel. More info.
OpenSUSE has updated the kernel. More info.
AlmaLinux has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/