Skip to main content

CND News and Blog

New Vulnerabilities Thursday 26 October


New Alerts for Apple (Exploit), Tenable, Rockwell Automation, Meinberg, IBM, and Linux.

Apple Exploit

Apple has published updates for iOS, iPadOS, macOS, tvOS, watchOS, and Safari. One vulnerability is being exploited in older iOS versions. Highest CVSSv3 score of 9.8
More info.

Tenable 

Tenable has updated Nessus Network Monitor with updates for third-party software included in the product. Highest CVSSv3 score of 7.8
More info.

Rockwell Automation 

FactoryTalk View Site Edition is vulnerable to Improper Input Validation that could result in a DoS. CVSSv3 score of 7.5
More info.

Due to inadequate code logic, a remote attacker with knowledge of a valid user account could potentially obtain a local Windows OS user token through the FactoryTalk Services Platform web service and then use the token to log in into FactoryTalk Services Platform. This vulnerability can only be exploited if the authorized user did not previously log in. CVSSv3 score of 8.1
More info.

Meinberg 

The LANTIME firmware has been updated to fix vulnerabilities in third-party software.
More info.

IBM 

A Gevent vulnerability was addressed in IBM Cloud Pak for Watson AIOps CVSSv3 score of 9.8
More info.

Linux 

Ubuntu has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 28 April 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/