Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-22497PUBLISHED: 2022-05-24IBM Aspera Faspex 4.4.1 and 5.0.0 could allow unauthorized access due to an incorrectly computed security token. IBM X-Force ID: 226951.
CVE-2022-29334PUBLISHED: 2022-05-24An issue in H v1.0 allows attackers to bypass authentication via a session replay attack.
CVE-2022-29337PUBLISHED: 2022-05-24C-DATA FD702XW-X-R430 v2.1.13_X001 was discovered to contain a command injection vulnerability via the va_cmd parameter in formlanipv6. This vulnerability allows attackers to execute arbitrary commands via a crafted HTTP request.
CVE-2022-29333PUBLISHED: 2022-05-24A vulnerability in CyberLink Power Director v14 allows attackers to escalate privileges via a crafted .exe file.
CVE-2021-3597PUBLISHED: 2022-05-24
A flaw was found in undertow. The HTTP2SourceChannel fails to write the final frame under some circumstances, resulting in a denial of service. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.35.SP1, prior to 2.2.6.SP1, prior to 2.2.7.SP1,...
User Rank: Ninja
4/24/2015 | 2:55:21 PM
One point made within that section is:
* "Assess DoD's cyber deterrence posture and strategy. - Building off of the Defense Science Board's Task Force on Cyber Deterrence, U.S. Strategic Command (USSTRATCOM), in coordination with the Joint Staff and the Office of the Secretary of Defense, will assess the Department of Defense's ability to deter specific state and non-state actors from conducting cyberattacks of significant consequence on the U.S. homeland and against U.S. interests, to include loss of life, significant destruction of property, or significant impact on U.S. foreign and economic policy interests."
- "In conducting its analysis, USSTRATCOM must determine whether DoD is building the capabilities required for attributing and deterring key threats from conducting such attacks and recommend specific actions that DoD can take to improve its cyber deterrence posture. Careful attention should be devoted also to deterring non-state actors that may fall outside of traditional deterrence frameworks but which could pose a considerable threat to U.S. interests."
As with all bureaucracy, action is hindered by deep audits and analysis - the verbiage here concerns me in that I translate this to be a multi-year effort. I'd be interested in seeing actual timelines and whether there is an escalation process in place to reach the recommendations phase so that implementation could begin more quickly. This initiative to me is the most critical, time-sensitive and policy-shaping for future work in information security technologies.