Skip to main content

CND News and Blog

New Vulnerabilities Tuesday 23 July


New Alerts for Siemens, HPE, PyTorch, IBM, Dell, BD, and Linux.

Siemens 

Multiple SICAM products are affected by unauthorized password reset and firmware downgrade vulnerabilities. Highest CVSSv4 score of 9.3
Note this is out of cycle for Siemens.
More info.

HPE 

A security vulnerability has been identified in certain HPE ProLiant DL/ML/SY/XL and Alletra Servers. The vulnerability could be remotely exploited to allow OOB write. CVSSv3 score of 9.8
More info.

PyTorch 

Two vulnerabilities have been identified in TorchServe. Highest CVSSv3 score of 9.8
More info. And here. Bulletin from AWS here.

IBM 

IBM QRadar Network Packet Capture includes components with multiple known vulnerabilities. Highest CVSSv3 score of 9.8
More info.

Dell 

Data Protection Advisor remediation is available for multiple vulnerabilities in third-party software. Dell rates this Critical.
More info.

BD 

BD has published security updates for Identity Provider Manager, Data Agent, and Alaris products.
More info.

Linux 

SUSE has updated the kernel. More info.
Red Hat has updated kpatch. More info.
Ubuntu has updated the kernel. More info.
Amazon Linux 2 has updated the kernel. More info.
Amazon Linux 2023 has updated the kernel. More info.
Alpine Linux has published a new release. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 04 October 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/