Skip to main content

CND News and Blog

New Vulnerabilities Friday 25 August


New Alerts for Opto 22, KNX, D-Link, IBM, NetApp, and Linux.

Opto 22 

SNAP PAC S1 contains several vulnerabilities that could allow a remote attacker to brute force passwords, access certain device files, or cause a DoS. Highest CVSSv3 score of 7.5
No patch, secure your network.
More info.

KNX 

KNX devices that use KNX Connection Authorization are vulnerable to being locked and users being unable to reset them to gain access to the device. A remote attacker could purge all devices, locking the device. CVSSv3 score of 7.5
No patch, secure your network.
More info.

D-Link 

D-Link DAP-2622, DAP-2610, DAP-3662, DAP-2330, COVR-3902, DIR-842, and R15 have multiple vulnerabilities.
More info. And here. And here.

IBM 

Node.js module vm2 is used internally by the Box and Snowflake connectors in Designer flows in IBM App Connect Enterprise Certified Container. CVSSv3 score of 9.8
More info.

NetApp 

NetApp has published 13 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 9.8
No patches yet.
More info.

Xerox 

Xerox has published an update for third-party software included in FreeFlow Print Servers.
More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 28 April 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/