Security CERT Global
- Weekly Report: Panasonic製KW Watcherに複数の脆弱性
- Weekly Report: 複数のCisco製品に脆弱性
- Weekly Report: 複数のMozilla製品に脆弱性
- Weekly Report: Trend Micro Mobile Securityにクロスサイトスクリプティングの脆弱性
- Weekly Report: NISCが「サイバーセキュリティ関係法令Q&AハンドブックVer2.0」を公開
- Weekly Report: 複数のApple製品に脆弱性
- CISA Adds One Known Exploited Vulnerability to Catalog
- WordPress Security Update
- F5 Security Update
- DebianOS Security Update
- SUSE Security Update
- Gentoo Security Update
- HP Security Update
- Exim Security Update
- Mediatek Security Update
- GitLab Security Update
- IBM Security Update
- CERTFR-2023-AVI-0799 : Vulnérabilité dans les produits Microsoft (03 octobre 2023)
- CERTFR-2023-AVI-0798 : Multiples vulnérabilités dans les produits IBM (03 octobre 2023)
- ESB-2023.5651 - [Appliance] F5 BIG-IP and BIG IQ Products: CVSS (Max): 4.4
- ESB-2023.5650 - [Appliance] F5 BIG-IP and BIG-IQ Products: CVSS (Max): 2.2
- ASB-2023.0180 - Quishing attacks:
- ESB-2023.5652 - [Cisco] Cisco Routers:
- ESB-2023.5649 - [Linux] IBM Security QRadar SIEM: CVSS (Max): 7.1
- ESB-2023.5648 - [Win][Linux][AIX] IBM App Connect Enterprise: CVSS (Max): 7.1
- ESB-2023.5627 - [SUSE] iperf: CVSS (Max): 7.4
- ESB-2023.5643 - [SUSE] Linux Kernel (Live Patch 1 for SLE 15 SP5): CVSS (Max): 7.8
- ESB-2023.5630 - [SUSE] MozillaFirefox: CVSS (Max): 7.5
- ESB-2023.5631 - [Debian] libvpx: CVSS (Max): 8.8*
- ESB-2023.5644 - [SUSE] Linux Kernel (Live Patch 26 for SLE 15 SP3): CVSS (Max): 7.8
- ESB-2023.5638 - [Debian] exim4: CVSS (Max): 8.1
- ESB-2023.5634 - [Appliance] Traffix SDC: CVSS (Max): 5.5
- ESB-2023.5632 - [Debian] firefox-esr: CVSS (Max): 9.8
- ESB-2023.5646 - [SUSE] python: CVSS (Max): 7.4
- ESB-2023.5639 - [Ubuntu] LibTomMath: CVSS (Max): 9.8
- ESB-2023.5635 - [SUSE] Linux Kernel (Live Patch 13 for SLE 15 SP4): CVSS (Max): 7.8
- ESB-2023.5642 - [SUSE] Linux Kernel (Live Patch 3 for SLE 15 SP5): CVSS (Max): 7.8
- ESB-2023.5641 - Linux Kernel (Live Patch 35 for SLE 15 SP3): CVSS (Max): 7.8
- ESB-2023.5628 - [SUSE] Golang Prometheus: CVSS (Max): 7.5
- ESB-2023.5640 - [SUSE] Linux Kernel (Live Patch 2 for SLE 15 SP5): CVSS (Max): 7.8
- ESB-2023.5645 - [SUSE] bind: CVSS (Max): 7.5
- ESB-2023.5633 - [RedHat] OpenShift GitOps: CVSS (Max): 7.5
- ESB-2023.5637 - [Debian] exim4: CVSS (Max): 9.8
- ESB-2023.5629 - [SUSE] xen: CVSS (Max): 7.5
- ESB-2023.5636 - [Appliance] F5 Products: CVSS (Max): 8.8*
- ESB-2023.5622 - [SUSE] libqb: CVSS (Max): 5.9
- ESB-2023.5621 - [SUSE] Linux Kernel (Live Patch 39 for SLE 15 SP2): CVSS (Max): 7.8
- ESB-2023.5619 - [SUSE] Linux Kernel (Live Patch 23 for SLE 15 SP3): CVSS (Max): 7.8
- ESB-2023.5620 - [SUSE] xen: CVSS (Max): 7.5
- ESB-2023.5625 - [SUSE] xen: CVSS (Max): 7.5
SEC Vulnerabilities: Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts
Software vulnerabilities can affect the security of any computer and industrial networked systems are no exception. Information about known vulnerabilities and possible countermeasures is being collected and published since several years, however the methodical introduction of changes and/or software patches in many industrial networks is not always possible, so that some known flaws can be left untreated as they are not considered harmful in principle.
http://ewic.bcs.org/upload/pdf/ewic_icscsr2015_paper7.pdf
Tags: Automation,CyberSecurity,ICS,ICS Vulnerabilities,IIot,Industrial Networked Systems,Infrastructure,SCADA,Vulnerability Sequences,