Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-20752PUBLISHED: 2022-07-06
A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to perform a timing attack. This vulnerability is due to insufficient pro...
CVE-2022-20768PUBLISHED: 2022-07-06
A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. This vulnerability is due to the storage of certain unencrypted credentials....
CVE-2022-20791PUBLISHED: 2022-07-06
A vulnerability in the database user privileges of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an auth...
CVE-2022-20800PUBLISHED: 2022-07-06
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity ...
CVE-2022-20808PUBLISHED: 2022-07-06
A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to incorrect handling of multiple simultaneous device registrations on Cisco SSM On-Prem. ...
User Rank: Author
8/27/2020 | 4:21:54 PM
But things are changing for two reasons. First, attackers have found profitable ways to take advantage of these systems (ransomware especially, but also espionage. So no longer is this just about nation-state risk to critical infrastructure. Second, the attack surface has expanded exponentially in the past 6 months with the increase of remote support of ICS/OT systems as well as the fact that IIOT is beginning to hit a tipping point of growth. The "air gap" that many have pointed to for defense was never truly a gap, but in many cases it created at least a minimal bump in the attacker path. Now, with remote access, the illusion of any air gap is gone. And as IIOT devices connect directly to the cloud, operators have created new angles into these environments.
It will take the hacker commununity some time to learn and develop skills for threatening ICS/OT at scale. But this expansion of the attack surface with new found ways of monetization create significant threats for unprotected ICS systems.