Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-30333PUBLISHED: 2022-05-09RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
CVE-2022-23066PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
CVE-2022-28463PUBLISHED: 2022-05-08ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
CVE-2022-28470PUBLISHED: 2022-05-08marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
CVE-2022-1620PUBLISHED: 2022-05-08NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.
User Rank: Author
8/27/2020 | 4:21:54 PM
But things are changing for two reasons. First, attackers have found profitable ways to take advantage of these systems (ransomware especially, but also espionage. So no longer is this just about nation-state risk to critical infrastructure. Second, the attack surface has expanded exponentially in the past 6 months with the increase of remote support of ICS/OT systems as well as the fact that IIOT is beginning to hit a tipping point of growth. The "air gap" that many have pointed to for defense was never truly a gap, but in many cases it created at least a minimal bump in the attacker path. Now, with remote access, the illusion of any air gap is gone. And as IIOT devices connect directly to the cloud, operators have created new angles into these environments.
It will take the hacker commununity some time to learn and develop skills for threatening ICS/OT at scale. But this expansion of the attack surface with new found ways of monetization create significant threats for unprotected ICS systems.