Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-30333PUBLISHED: 2022-05-09RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
CVE-2022-23066PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
CVE-2022-28463PUBLISHED: 2022-05-08ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
CVE-2022-28470PUBLISHED: 2022-05-08marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
CVE-2022-1620PUBLISHED: 2022-05-08NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.
User Rank: Apprentice
3/17/2018 | 3:08:08 PM
First, anyone that has actuallty read the proposed legislation in 18 states would notice that the only information, firmware, parts, tools and diagnostics required are those ALREADY being provided to thousands of repair techs around the world. None of this information is secret, and most of it is arleady available illegally in asia. Legislation is carefully targeted for the sole purpose of allowing legal competition for repair services at the choice of the owner.
Even when the equipment being repaired is being used for a security function (such as a security camera), the application run on cpu within the camera is irrelevant to repair. The camera either passes a signal correctly or it does not. Someone has to repair the camera, and give it back to the owner. Its the owner that cares about his or her security -- and its still the owner that gets to decide whom to trust for repair.
If anyone has any doubts of the responsibility of the OEM to protect the security of the owner, just read the purchase contract closely, Every contract always dislaims responsibility for how equipment is used and carefull limits their risk and potential damages in that contract.
As to actual cyber risk -- equipnent is either secure by design, or insecure. Sadly, millions of IOT devices are being thrown into the marketplace with weak or absent security -- allowing botnets and other hacks to proliferate worldwide. These devices are already up and running and attached to a network, unlike devices which are broken and offline. Equipment under repair is among the most secure because its offline.
Opponents to Right to Repair have gleefully suggested that consumers will lose personal data without any explaination of how that might happen. We've yet to hear of anyone losing personal data as the result of an iPhone repair -- because Apple does an excellent job of security and encryption. Apple has even stated publically that despite their source code being posted on the internet, personal security was never at risk.
Happy to discuss any real examples of how repair as a business has made IOT devices less secure.