Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-33654PUBLISHED: 2022-06-27When performing the initialization operation of the Split operator, if a dimension in the input shape is 0, it will cause a division by 0 exception.
CVE-2022-2088PUBLISHED: 2022-06-27An authenticated user with admin privileges may be able to terminate any process on the system running Elcomplus SmartICS v2.3.4.0.
CVE-2022-2106PUBLISHED: 2022-06-27Elcomplus SmartICS v2.3.4.0 does not validate the filenames sufficiently, which enables authenticated administrator-level users to perform path traversal attacks and specify arbitrary files.
CVE-2022-2140PUBLISHED: 2022-06-27Elcomplus SmartICS v2.3.4.0 does not neutralize user-controllable input, which allows an authenticated user to inject arbitrary code into specific parameters.
CVE-2013-2216PUBLISHED: 2022-06-27** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
User Rank: Apprentice
6/19/2015 | 11:05:14 AM
I find it distrurbing the amount of data breaches lately and the lack of understanding on HOW the real damage is caused.
Here is a fact to chew on...
100% of all advanced attacks exploit privileged credentials. In this case however, they didn't even have to exploit them because they were given full authorization to access anything they wanted from the get go.
Hello!?!?!? Anyone over at the OPM ever hear of "least privlieged" access policies! Geez.
Scarier yet , even though most in the business would say it's ill advised to offer such carte blanc access to any administrator in the private sector, giving root access to admin's is still quite common in all industries , from small businesses to large mulkti national corporations.
Ask Sony Pictures, Athem, Premera, and Target.