Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-48176PUBLISHED: 2023-01-31Netgear routers R7000P before v1.3.3.154, R6900P before v1.3.3.154, R7960P before v1.4.4.94, and R8000P before v1.4.4.94 were discovered to contain a pre-authentication stack overflow.
CVE-2022-45897PUBLISHED: 2023-01-31On Xerox WorkCentre 3550 25.003.03.000 devices, an authenticated attacker can view the SMB server settings and can obtain the stored cleartext credentials associated with those settings.
CVE-2022-32528PUBLISHED: 2023-01-30A CWE-306: Missing Authentication for Critical Function vulnerability exists that could cause access to manipulate and read files in the IGSS project report directory when an attacker sends specific messages. Affected Products: IGSS Data Server - IGSSdataServer.exe (Versions prior to V15.0.0.22170)
CVE-2022-32529PUBLISHED: 2023-01-30
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause a stack-based buffer overflow, potentially leading to remote code execution when an attacker sends specially crafted log data request messages. Affected Products: IGSS Data Server - IGSSdataServer.exe (Versio...
CVE-2022-32747PUBLISHED: 2023-01-30
A CWE-290: Authentication Bypass by Spoofing vulnerability exists that could cause legitimate users to be locked out of devices or facilitate backdoor account creation by spoofing a device on the local network. Affected Products: EcoStruxureâ„¢ Cybersecurity Admin Expert (CAE) (Vers...
User Rank: Apprentice
8/30/2016 | 3:58:14 PM
Remember when your Mother told you to chew your food carefully and not just gulp it down? Works with data as well. It is not how much you "consume" but rather how you go about chewing through the data to produce information. that when analyzed results in actionable intelligence products.
You need a metehodology when it comes to assessing your data. NGA, DoD, DIA, CIA and just about all the other three-letter agencies in the IC, working the cyber problem, are already relying on Acitivity-Based Intelligence (ABI) methods and tradecraft, enabled by Object Based Production (OBP) techniques.
No, they are not just "buzzwords"and yes they are getting good results. If you have not heard of ABI or OBP, then you probably really are just gulping down your food! I mean your data, and choking on it! Not a criticism, just an observation! :->)