Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12512PUBLISHED: 2021-01-22Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513PUBLISHED: 2021-01-22Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514PUBLISHED: 2021-01-22Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
CVE-2020-12525PUBLISHED: 2021-01-22M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CVE-2020-12511PUBLISHED: 2021-01-22Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.
User Rank: Apprentice
6/3/2015 | 4:33:24 PM
And the use of probability as a factor in this is flawed. Time and time again estimated probabilities have been shown to be flawed. Just look up "Black Swan." To be clear when human life is at stake there is no room for a simple equation to justify a decision to allow a potentially unsafe system to operate when the consequences are dire. It is morally and ethically irresponsible. Try talking probabilty to a lineman or carman who deals with lifethreatening materials every hour of his working life. Does he think in probabilities or certainties when they enter the operational environment. There is a reason that the field as Safety rules.
The use of risk to manage IT Security has been showed as a flawed approach resulting in misapplication of resources and worst of all, incorrect and misleading meausurements. People should realize this by now. How many "unforeseen" "Mega" breaches have to occur?