Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132PUBLISHED: 2021-02-27SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284PUBLISHED: 2021-02-27An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144PUBLISHED: 2021-02-27In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148PUBLISHED: 2021-02-27An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...
User Rank: Apprentice
12/3/2014 | 6:56:20 AM
Let me describe it like this: Cyber Security is an ecosystem. Any breakdown in that ecosystem will have ripple effects all across it. One of the most common effects of such a breakdown is the watering down of security monitoring staff, either due to budget constraints, or diverting security staff to other areas (compliance/audit, projects, etc.). This.happens.every.single.day to Cyber Security staff across virtually all markets, including Critical Infrastructure. That ripple effect results in not having sufficient people with their eyes on the screen mitigating security issues as they occur. Add to this is the fact that (in Target's case) they were off shoring some of their security monitoring. That suggests to me they were trying to keep security budgets as low as possible. So there are a couple of bread crumbs to follow...
We are in the early stages of a cyber war and look at who some here are blaming for the compromises... the people trying to defend against them. We should be blaming the corporate boards and executive management for failing to properly fund and staff their security programs.
Ask yourself this... What has been the single most common response by major companies over the past year in addressing their security breaches? *Increased funding for Cyber Security*. More bread crumbs...
This will be my last response to this discussion. I need to get back to security monitoring... :)