Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196PUBLISHED: 2023-05-26Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879PUBLISHED: 2023-05-26GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
User Rank: Ninja
7/16/2019 | 10:05:22 AM
If this aspect is one of their main concerns, why don't they bring in third-party consultants to address some of their issues? A number of health-care agencies have a direct relationship with the university's CIS or IT divisions. It would make sense to tap into that knowledge base on campus (i.e. CIS - Computer Information Systems). The university's IT group could help address some of the IT security issues, not sure if they are but it would be interesting to see what they are doing to protect this data?
Please review the top NAC solutions (comparison listed below), it is imperative because NACs ensure isolated access to medical devices.
NAC Device Comparison Reference
Per the conversations on DR (Dark Reading), it is imperative to put the medical devices on their own network (network segmentation), then route all of the traffic from the various devices to managing switches (daisy chain or cluster them together). By isolating the traffic, the hospital could filter access to the medical devices (i.e. Med-Dev, made it up) to only to their management systems and staff, nothing else. This process could limit the external attack by reducing the hospital's attack surface. Also, I would suggest the following as a possible solution:
The vendor needs to support IPv6, most of the hack attempts identified have occurred on IPv4 and not IPv6 (Russia, China, North Korea, Iran, Japan).
Todd