The Computer Network Defence Alert State is designed to give a granular and more dynamic visualisation of the current cyber security threat. Any increase in an alert state will occur immediately an issue is detected and it will drop again by one level each working day.
Our rationale for this agility is that vulnerabilities often occur in clusters, therefore reducing the alert state again quickly, will increase your visibility of new threats to the same product. Daily reductions in alert state occur at approximately 1900 GMT/UTC. Significant vulnerabilities may remain for longer. Vulnerabilities on this page are predominantly remotely executable, very few local server exploits will be shown.
SUSE has updated kerberos, wget, python, and others. More Info.
CentOS has updated mod_auth_mellon. More Info.
RedHat has updated mod_auth_mellon and python. More Info.
Debian has updated ruby and ghostscript. More Info.
Ubuntu has updated openjdk and others. More Info.
Oracle Linux has updated mod_auth_mellon. More Info.
All F5 products are vulnerable to a glibc heap-based buffer over-read. An attacker may run arbitrary code or cause a denial-of-service (DoS). No fixes yet.
NetApp has published ten bulletins about vulnerabilities in third-party software included as part of their products. Third-party software includes kubernetes, apache, Linux kernel, Kerberos, and others. Only two of the bulletins indicate patches are available.
This alert state represents the return towards normalisation of an alert state, indicating that there was a higher alert state due to a product vulnerability during the previous few days.
This alert state indicates that a product vulnerability has been identified within the last few days. The vulnerability is either difficult to exploit, or if exploited, results in reduced impact to the target system.
This alert state indicates a more serious vulnerability which is exploitable.
This bottom descriptor is used with Indicates an alert state which has been present for more than 24 hours. It will typically be paired with Guarded, and could be changed to +48hr for an item that came out as Critical.
This bottom descriptor indicates that patches are available for vulnerabilities, whether it is the initial report or a patch of a vulnerability that had been previously reported. It could be paired with Increased or High, and on rare occasions Critical.
This bottom descriptor indicates that an Exploit has been made public for a vulnerability, whether it is the initial report or an indication of an exploit for a vulnerability that had been previously reported. It could be paired with High or Critical.
This bottom descriptor indicates that a vulnerability has been announced without the opportunity for the vendor to patch it before the details are made known. It could be paired with High or Critical.