Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142PUBLISHED: 2023-03-27In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143PUBLISHED: 2023-03-27In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144PUBLISHED: 2023-03-27Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145PUBLISHED: 2023-03-27Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655PUBLISHED: 2023-03-27Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.
User Rank: Apprentice
9/17/2014 | 7:30:43 AM
So being VP Marketing at LightCyber I definitely understand where your question is coming from as there does seem to be some confusion to what exactly is a "breach".
NSS BDS report compares sandboxing solutions such as Fireeye and others. These product detect malware in incoming mail or web downloads.
Some people argue that sandboxing is a prevention technology (like IPS, UTM, FW and anti-virus) and not a breach detection technology, as it tries to block *potential* infections and not actual breaches.
LightCyber detects the presence and behavior of attackers inside the network when they are already in, but much before the damage is done, regardless of the intrusion vector. In many cases malware is not even part of the process - it could be an attacker that has gained access via remote access, an insider, or a BYOD. Once the attacker is inside it takes him months to create the damage, and LightCyber can detect the breach on the first day or so, by detecting the lateral movement in the network and endpoints.
So LightCyber can detect an active breach regardless of the attack vector.
Since LightCyber covers a different part of the attack, it is not relevant to be compared against Sandboxing products.
I hope that this answers your question.
Debbie Cohen-Abravanel
VP Marketing
LightCyber