Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-37452PUBLISHED: 2022-08-07Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-26979PUBLISHED: 2022-08-06Foxit PDF Reader before 12.0.1 and PDF Editor before 12.0.1 allow a NULL pointer dereference when this.Span is used for oState of Collab.addStateModel, because this.Span.text can be NULL.
CVE-2022-27944PUBLISHED: 2022-08-06Foxit PDF Reader before 12.0.1 and PDF Editor before 12.0.1 allow an exportXFAData NULL pointer dereference.
CVE-2022-2688PUBLISHED: 2022-08-06
A vulnerability was found in SourceCodester Expense Management System. It has been rated as critical. This issue affects the function fetch_report_credit of the file report.php of the component POST Parameter Handler. The manipulation of the argument from/to leads to sql injection. The attack may be...
CVE-2022-2689PUBLISHED: 2022-08-06
A vulnerability classified as problematic has been found in SourceCodester Wedding Hall Booking System. Affected is an unknown function of the file /whbs/?page=contact_us of the component Contact Page. The manipulation of the argument Message leads to cross site scripting. It is possible to launch t...
User Rank: Apprentice
3/17/2018 | 3:08:08 PM
First, anyone that has actuallty read the proposed legislation in 18 states would notice that the only information, firmware, parts, tools and diagnostics required are those ALREADY being provided to thousands of repair techs around the world. None of this information is secret, and most of it is arleady available illegally in asia. Legislation is carefully targeted for the sole purpose of allowing legal competition for repair services at the choice of the owner.
Even when the equipment being repaired is being used for a security function (such as a security camera), the application run on cpu within the camera is irrelevant to repair. The camera either passes a signal correctly or it does not. Someone has to repair the camera, and give it back to the owner. Its the owner that cares about his or her security -- and its still the owner that gets to decide whom to trust for repair.
If anyone has any doubts of the responsibility of the OEM to protect the security of the owner, just read the purchase contract closely, Every contract always dislaims responsibility for how equipment is used and carefull limits their risk and potential damages in that contract.
As to actual cyber risk -- equipnent is either secure by design, or insecure. Sadly, millions of IOT devices are being thrown into the marketplace with weak or absent security -- allowing botnets and other hacks to proliferate worldwide. These devices are already up and running and attached to a network, unlike devices which are broken and offline. Equipment under repair is among the most secure because its offline.
Opponents to Right to Repair have gleefully suggested that consumers will lose personal data without any explaination of how that might happen. We've yet to hear of anyone losing personal data as the result of an iPhone repair -- because Apple does an excellent job of security and encryption. Apple has even stated publically that despite their source code being posted on the internet, personal security was never at risk.
Happy to discuss any real examples of how repair as a business has made IOT devices less secure.