Skip to main content

CND News and Blog

New Vulnerabilities Tuesday 28 February


New Alerts for WAGO, ABB, IBM, ASUS, HCL Software, and Linux.

WAGO 

The Web-Based Management of WAGOs programmable logic controller is typically used for administration, commissioning and updates. A remote attacker can write data with root privileges or perform reflected XSS attacks. Highest CVSSv3 score of 9.8
More info.

ABB 

Hitachi's IEC 61850 communication stack is used in the AC 800PEC and AC 800PEC based-products. A remote attacker could force the IEC 61850 MMS-server communication stack to stop accepting new MMS-client connections, resulting in a DoS. CVSSv3 score of 5.9 No patches yet.
More info.

IBM

Six Bash vulnerabilities were disclosed in September 2014. Bash is used by IBM SAN b-type Switches. Highest CVSSv3 score of 10
More info.

ASUS 

ASUS ASMB8 iKVM firmware contains a vulnerability where SNMPv2 can be used with write access to introduce arbitrary extensions to achieve remote code execution as root. The researchers also discovered a hardcoded administrative account.
More info.

HCL Software 

HCL Connections has updated IBM Websphere Application Server to correct two vulnerabilities. Highest CVSSv3 score of 8.1
More info.

Linux 

Red Hat has updated the kernel and kpatch. More info.
Oracle Linux has updated sudo. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 April 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/