Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142PUBLISHED: 2023-03-27In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143PUBLISHED: 2023-03-27In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144PUBLISHED: 2023-03-27Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145PUBLISHED: 2023-03-27Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655PUBLISHED: 2023-03-27Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.
User Rank: Ninja
11/30/2017 | 11:57:08 AM
Also, if someone accessed a website or nefarious email, then you would still control the credentials, but the access to the system would be in the form of an APT or root-kit but is downloaded in the background, thus again, your system is compromised, and you still have control of the credentials.
This is not a silver bullet solution, we can only try to security our environment by controlling the Keys/Credentials, NGFW, locked down servers, Zone policies, SIEM devices, trained staff, but with all of that, they could access our servers over the power lines (EoP). Good luck with your commentary, it seems there are a few things that have been left out as part of the discussion.
T