Skip to main content

CND News and Blog

New Vulnerabilities Friday 23 February


New Alerts for Semtech, Dell, NetApp, WAGO, and Linux.

Semtech 

Three vulnerabilities affect the Sierra Wireless EM919x and EM929x cellular modules. These vulnerabilities were announced as part of Qualcomm's December Security Bulletin. Highest CVSSv3 score of 7.5
More info.

Dell 

Dell Avamar server, Dell Avamar Virtual Edition and Dell Integrated Data Protection Appliance remediation is available for Apache Struts 2 security vulnerabilities. Dell rates this Critical.
More info.

Dell Avamar, Dell NetWorker Virtual Edition, and Dell PowerProtect DP Series Appliance /Integrated Data Protection Appliance remediation is available for multiple vulnerabilities. Dell rates this Critical.
More info.

NetApp 

NetApp has published 8 bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 8.1
No patches yet.
More info.

WAGO 

WAGO products are affected by the Terrapin attack vulnerability in the SSH transport protocol that allows a remote attacker to compromise the integrity of connections, potentially leading to the downgrade or disablement of critical security features. CVSSv3 score of 5.9
More info.

Linux 

CentOS 7 has updated the kernel firmware. More info.
Oracle Linux has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 07 May 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/