Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31650PUBLISHED: 2022-05-25In SoX 14.4.2, there is a floating-point exception in lsx_aiffstartwrite in aiff.c in libsox.a.
CVE-2022-31651PUBLISHED: 2022-05-25In SoX 14.4.2, there is an assertion failure in rate_init in rate.c in libsox.a.
CVE-2022-29256PUBLISHED: 2022-05-25
sharp is an application for Node.js image processing. Prior to version 0.30.5, there is a possible vulnerability in logic that is run only at `npm install` time when installing versions of `sharp` prior to the latest v0.30.5. If an attacker has the ability to set the value of the `PKG_CONFIG_PATH` e...
CVE-2022-26067PUBLISHED: 2022-05-25
An information disclosure vulnerability exists in the OAS Engine SecureTransferFiles functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to arbitrary file read. An attacker can send a sequence of requests to trigger this vulnera...
CVE-2022-26077PUBLISHED: 2022-05-25
A cleartext transmission of sensitive information vulnerability exists in the OAS Engine configuration communications functionality of Open Automation Software OAS Platform V16.00.0112. A targeted network sniffing attack can lead to a disclosure of sensitive information. An attacker can sniff networ...
User Rank: Ninja
1/14/2015 | 12:16:11 PM
Imagine a company that has invested heavily in (at the time) state of the art security appliances. They pour lots of dollars into installation, configuration, training, optimization, etc. Well, what was state of the art then becomes somewhat outdated very rapidly given the ever changing threat landscape, increasing sophistication of the attack vectors, and mitigating technology advances. The company then has to spend a lot every year just to update and maintain those systems (hopefully not forklift and replace them), and train employees on the updates, in addition to whatever "normal" training they have to undergo. Outsourcing the hardware and monitoring components seems like a more reasonable and predictable cost. Within the company, there needs to be a very comprehensive and well defined Event and Incident Response strategy that can rapidly act upon any suspect event identified by the solution provider. Target had a similar model, but the breach was largely aided by an improperly handled event; their security personnel were notified of the suspect event (malware presence) by their service provider, but their incident handling procedures failed them.
I'm sure many companies have the strategy where they throw technology in to resolve a security gap, giving them an increased sense of security, but in reality, unless the companies have a sound security strategy in place that is based on well known basic security practices (such as the SANS 20 Critical Controls among others), all that technology will only serve as a false sense of security.