현재 자주 악용되고 있는 취약점 목록으로, 취약한 버전의 SW를 사용 중인 경우 긴급 패치를 권고 드립니다. * 참조 링크 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog
cveID | vendorProject | vulnerabilityName | dateAdded | shortDescription | requiredAction | dueDate |
---|
CVE-2023-36851 | Juniper | Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability | 2023-11-13 | Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-17 |
---|
CVE-2023-36847 | Juniper | Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability | 2023-11-13 | Juniper Junos OS on EX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-17 |
---|
CVE-2023-36846 | Juniper | Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability | 2023-11-13 | Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-17 |
---|
CVE-2023-36845 | Juniper | Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability | 2023-11-13 | Juniper Junos OS on EX Series and SRX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control an important environment variable. Using a crafted request, which sets the variable PHPRC, an attacker is able to modify the PHP execution environment allowing the injection und execution of code. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-17 |
---|
CVE-2023-36844 | Juniper | Juniper Junos OS EX Series PHP External Variable Modification Vulnerability | 2023-11-13 | Juniper Junos OS on EX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables, leading to partial loss of integrity, which may allow chaining to other vulnerabilities. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-11-17 |
---|
CVE-2023-47246 | SysAid | SysAid Server Path Traversal Vulnerability | 2023-11-13 | SysAid Server (on-premises version) contains a path traversal vulnerability that leads to code execution. | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | 2023-12-04 |
---|
|
|