Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31650PUBLISHED: 2022-05-25In SoX 14.4.2, there is a floating-point exception in lsx_aiffstartwrite in aiff.c in libsox.a.
CVE-2022-31651PUBLISHED: 2022-05-25In SoX 14.4.2, there is an assertion failure in rate_init in rate.c in libsox.a.
CVE-2022-29256PUBLISHED: 2022-05-25
sharp is an application for Node.js image processing. Prior to version 0.30.5, there is a possible vulnerability in logic that is run only at `npm install` time when installing versions of `sharp` prior to the latest v0.30.5. If an attacker has the ability to set the value of the `PKG_CONFIG_PATH` e...
CVE-2022-26067PUBLISHED: 2022-05-25
An information disclosure vulnerability exists in the OAS Engine SecureTransferFiles functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to arbitrary file read. An attacker can send a sequence of requests to trigger this vulnera...
CVE-2022-26077PUBLISHED: 2022-05-25
A cleartext transmission of sensitive information vulnerability exists in the OAS Engine configuration communications functionality of Open Automation Software OAS Platform V16.00.0112. A targeted network sniffing attack can lead to a disclosure of sensitive information. An attacker can sniff networ...
User Rank: Author
4/26/2018 | 1:34:23 PM
1. Create a seperate network ONLY for IoT devices.
2. Only allow devices to join your network via known MAC addresses. This will prevent any unwanted devices from trying to get in. In fact, on your seperate network, you can restrict any device joining it unless you specifically entered in the MAC address yourself.
3. If you have a hub at home - like a Wink, for example - make sure that it remains up-to-date.
4. Keeping your devices firmware and software updated is key. It's not always easy, we have a lot of devices at home. However, look at your apps regularly to see if there are updates.
5. Newer routers have some really cool 'fencing' solutions which prevent people from parking outside your house and spoofing your WiFi - look for networking gear which can provide a bit more security like that.
6. Passwords upkeep is important. Again, if you're connecting through a centralized hub - changing your password every now and again is a good idea.
7. If you've got things like sensors, actuators, or something else that collects and then delivers data to a centralized aggregation engine - make sure that VM, server, or machine is locked down as well. Virtualization is a great way to centralize your VMs and ensure networks and data remain secure.
8. If you're working with a hub or some kind of centralized IoT platform, restrict access, ensure complex passwords, and make sure to check for updates regularly.
Of course, there are even more tips out there depending on the kind of devices you're using. But this is a good start.