forked from wagov/wasocshared
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
15 changed files
with
303 additions
and
64 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
24 changes: 24 additions & 0 deletions
24
docs/advisories/20240226001-Multiple-Microsoft-Edge-Vulnerabilities.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
# Microsoft Edge Spoofing and Information Disclosure Vulnerabilities - 20240226001 | ||
|
||
## Overview | ||
|
||
Microsoft has released security advisories relating to multiple vulnerabilities present in select Microsoft Edge versions. | ||
An attacker who has successfully exploited these vulnerabilities could obfuscate and spoof of elements in the UI and lead to escape of the browser sandbox environment. | ||
|
||
## What is vulnerable? | ||
|
||
| Product(s) Affected | Summary | Severity | CVSS | | ||
| -------------------------------------- | ----------------------------------------------------------------- | -------- | ---- | | ||
| **versions before** <br> 122.0.2365.52 | [CVE-2024-26188](https://nvd.nist.gov/vuln/detail/CVE-2024-26188) | **Low** | 4.3 | | ||
| **versions before** <br> 122.0.2365.52 | [CVE-2024-26192](https://nvd.nist.gov/vuln/detail/CVE-2024-26192) | **High** | 8.2 | | ||
|
||
## What has been observed? | ||
|
||
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. | ||
|
||
## Recommendation | ||
|
||
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month...* (refer [Patch Management](../guidelines/patch-management.md)): | ||
|
||
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-26188 | ||
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-26192 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
# Cisco Patches NX-OS DoS Vulnerabilities - 20240305001 | ||
|
||
## Overview | ||
|
||
Cisco have released updates for their NX-OS products that address high severity Denial of Service (DoS) vulnerabilities which could cause a vulnerable device to stop processing network traffic or restart. There are no workarounds. | ||
|
||
## What is vulnerable? | ||
|
||
Affected Cisco products: | ||
|
||
- Nexus 3000 Series Switches | ||
- Nexus 5500 Platform Switches | ||
- Nexus 5600 Platform Switches | ||
- Nexus 6000 Series Switches | ||
- Nexus 7000 Series Switches | ||
- Nexus 9000 Series Switches in standalone NX-OS mode | ||
- Cisco Nexus 9500 R-Series Line Cards | ||
|
||
For more details about the vulnerable products, please refer to the *Recommendation* section below. | ||
|
||
## What has been observed? | ||
|
||
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. | ||
|
||
## Recommendation | ||
|
||
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours* if the products are internet facing (refer [Patch Management](../guidelines/patch-management.md)): | ||
|
||
- [Cisco NX-OS Software MPLS Encapsulated IPv6 Denial of Service Vulnerability](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipv6-mpls-dos-R9ycXkwM) | ||
- [Cisco NX-OS Software External Border Gateway Protocol Denial of Service Vulnerability](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ebgp-dos-L3QCwVJ) |
Oops, something went wrong.