Vulnerability Details
The Computer Network Defence Alert State is designed to give a granular and more dynamic visualisation of the current cyber security threat. Any increase in an alert state will occur immediately an issue is detected and it will drop again by one level each working day.
Our rationale for this agility is that vulnerabilities often occur in clusters, therefore reducing the alert state again quickly, will increase your visibility of new threats to the same product. Daily reductions in alert state occur at approximately 1900 GMT/UTC. Significant vulnerabilities may remain for longer. Vulnerabilities on this page are predominantly remotely executable, very few local server exploits will be shown.
Thursday 20 March 2025

Patch
Spring

Patch
Two vulnerabilities have been patched in Spring Security. Highest CVSSv3 score of 7.4
More info.
Linux

Patch
Wednesday 19 March 2025
Progress

Patch
LoadMaster has been updated to fix a vulnerability that allows a remote attacker to issue a crafted HTTP request that causes a stack-based buffer overflow and potentially execute arbitrary system commands. CVSSv3 score of 9.8
More info.
Atlassian

Patch
Atlassian Monthly Patches include updates for Bamboo Data Center and Server, Bitbucket Data Center and Server, Crowd Data Center and Server, Jira Data Center and Server, and Jira Service Management Data Center and Server. Highest CVSSv3 score of 8.8
More info.
IBM

Patch
IBM has published Critical bulletins for Rapid Infrastructure Automation, and AIX.
More info.
Tuesday 18 March 2025
Ricoh

Patch
Ricoh MFP and Printers contain vulnerabilities in the PostScript interpreter and embeded webserver that could result in RCE. Highest CVSSv3 score of 9.1
More info.
MB Connect

Patch
The data24 service that is bundled with every installation of mbCONNECT24/mymbCONNECT24 has two vulnerabilities in core components that can lead to a complete loss of confidentiality, integrity and availability. Highest CVSSv3 score of 9.1
More info.
IBM

Patch
IBM has published a Critical bulletin for Rapid Infrastructure Automation.
More info.
Helmholz

Patch
The data24 service that is bundled with every installation of myREX24/myREX24.virtual has two vulnerabilities in core components that can lead to a complete loss of confidentiality, integrity and availability. Highest CVSSv3 score of 9.1
More info.
CODESYS

Patch
Due to an insecure standard configuration of the CODESYS Gateway, it is accessible remotely by default. CVSSv3 score of 5.3
More info.
The OPC UA contains an optional security policy that is vulnerable against attacks on the private key, resulting in loss of confidentiality or authentication bypass. The affected policy may be enabled by a customer configuration. CVSSv3 score of 7.5
More info.
Monday 17 March 2025
SICK

New
Critical vulnerabilities have been found in the SICK device DL100-2xxxxxxx that could allow a remote attacker to impact availabiltiy, integrity and confidentaility of the products. Highest CVSSv3 score of 9.8
No patches, use good security.
More info.
Santesoft

Patch
IBM

Patch
IBM has published Critical bulletins for watsonx Assistant Cartridge, Observability with Instana, API Connect, App Connect, CloudPak for Data, Qiskit SDK OPY, and ISSC/IMC.
More info.
Dell

Patch
Dell has published Critical bulletins for APEX Cloud Platform, and VxRail.
More info.
Linux

Patch
Friday 14 March 2025
PHP

Patch
PHP has been updated to fix several vulnerabilities. Highest CVSSv3 score of 7.5
More info.
expat

Patch
Microsoft

Patch
Microsoft has updated Edge with the latest chromium updates.
More info.
Arista

Patch
Arista EOS with Traffic Policies configured contains a vulnerability that will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. CVSSv3 score of 7.5
More info.
Shibboleth

Patch
Updates in Shibboleth fix several security vulnerabilities. Highest CVSSv3 score of 9.8
More info.
NetApp

New
NetApp has published 7 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 9.9
No patches yet.
More info.
Linux

Patch
Thursday 13 March 2025
Cisco

Patch
Cisco has published 11 bulletins, 8 rated High and 3 rated Medium. Highest CVSSv3 score of 8.6
More info.
Vulnerabilities in the IPv4 ACL feature, QoS policy feature, and Layer 3 multicast feature of Cisco IOS XR Software for Cisco ASR 9000, ASR 9902 Compact, and ASR 9903 Compact could allow a remote attacker to cause a line card to reset, resulting in a DoS. CVSSv3 score of 8.6
More info. And here.
A vulnerability in the IKEv2 function of Cisco IOS XR Software could allow a remote attacker to prevent an affected device from processing any control plane UDP packets. CVSSv3 score of 7.5
More info.
Palo Alto
Networks

Patch
Palo Alto Networks has published 6 bulletins, 1 rated High, 4 rated Medium, and 1 rated Low. Highest CVSSv3 score of 7.6
More info.
Microsoft

Patch
Microsoft has updated Edge with the latest chromium updates.
More info.
Xerox

Patch
Xerox has published Security updates for FreeFlow Print Server.
More info.
ABB

Patch
RMC-100 and RMC-100 LITE has been updated to fix a vulnerability that allows a remote attacker to send a specially crafted message to the web UI node, causing a DoS. CVSSv3 score of 7.5
More info.
Lenovo

Patch
Linux

Patch
Wednesday 12 March 2025
Microsoft

Exploit
Adobe

Patch
Monthly Patches include updates for Acrobat Reader, 3D Sampler, Illustrator, Substance 3D Painter, InDesign, Substance 3D Modeler, and Substance 3D Designer. Highest CVSSv3 score of 7.8
More info.
Fortinet

Patch
Monthly Patches are out with 19 new bulletins and 1 updated bulletin. Updated products include FortiAnalyzer, FortiManager, FortiAnalyzer-BigData, FortiSandbox, FortiNDR, FortiWeb API, FortiSiem, FortiIsolator, FortiOS, FOrtiProxy, FOrtiPAM, FortiSRA, FortiManager CLI, FortiMail CLI, and FortiADC GUI. Highest CVSSv3 score of 9.8
More info. And here.
Apple

Patch
Apple has published security bulletins for Safari, iOS, iPadOS, macOS, and visionOS. Highest CVSSv3 score of 8.8
More info.
HPE

Patch
A security vulnerability in HPE Cray XD670 server using AMI BMC Redfish API could allow a remote attacker to achieve authentication bypass. CVSSv3 score of 10.
More info.
Vulnerabilities have been identified in HPE ProLiant DX Servers that allow a remote attacker to cause a DoS. Highest CVSSv3 score of 5.5
More info.
Optigo
Networks

Patch
Visual BACnet Capture Tool, Optigo Visual Networks Capture Tool contain several vulnerabilities, including Use of Hard-coded, Security-relevant Constants, Authentication Bypass Using an Alternate Path or Channel. Highest CVSSv4 score of 9.3
More info.
Linux

Patch
Tuesday 11 March 2025
Siemens

Patch
Monthly Patches include 27 bulletins, 11 new and 16 updated. Highest CVSSv4 score of 9.5
More info.
Multiple products contain two authentication bypass vulnerabilities that could allow a remote attacker to gain access to the data managed by the server. CVSSv3 score of 9.1
More info.
SINAMICS S200 devices contain an unlocked bootloader vulnerability that could allow a remote attacker to download untrusted firmware that could damage or compromise the device. CVSSv4 score of 9.5
More info.
SINEMA Remote Connect Client is affected by multiple vulnerabilities. Highest CVSSv3 score of 9.8
More info.
SiPass integrated ACC devices contain multiple vulnerabilities that could allow a remote attacker to access sensitive data. Highest CVSSv4 score of 9.4
More info.
Schneider
Electric

Patch
Monthly Patches include 5 bulletins, 3 new and 2 updated. Of the new bulletins, highest CVSSv4 score of 9.2
More info.
A vulnerability in WebHMI component used in EcoStruxure Power Automation System User Interface and EcoStruxure Microgrid Operation Large (EMO-L) solution allows a remote attacker to execute unauthorized commands. Requires default password credentials. CVSSv4 score of 9.2
More info.
SAP

Patch
Security Patch Day saw the release of 21 new Security Notes and 3 updated. Five are rated High, 14 rated Medium, and 5 rated Low. Of the new bulletins, highest CVSSv3 score of 8.8
More info.

Patch
Apache

Patch
Tomcat has been updated to fix an RCE vulnerability.
More info.
Zoom

Patch
Linux

Patch
Monday 10 March 2025
Broadcom

Patch
Brocade ASCG contains a vulnerability that allows a remote attacker to cause a DoS. CVSSv3 score of 7.5
More info.
Microsoft

Patch
Microsoft has updated Edge with the latest chromium fixes and one Edge-specific fix.
More info.
F5

New
BIG-IP Next contains a vulnerability that allows a remote attacker to cause a DoS. CVSSv3 score of 5.3
No patches yet.
More info.
HPE

Patch
HPE Telco Service Activator contains several vulnerabilities. Highest CVSSv3 score of 7.5
More info.
QNAP

Patch
QNAP has published 10 new bulletins identifying vulnerabilities in QVPN Device Client, Qsync Client, Qfinder Pro for Mac, QuLog Center, QTS, QuTS hero, File Station 5, QuRouter, Helpdesk, and HPS 3.
More info.
IBM

Patch
IBM has published Critical bulletins for Aspera Shares, Engineering Requirements Management DOORS Next, Guardium Data Security Center, and Watson Discovery for Cloud Pak for Data. Highest CVSSv3 score of 10.
More info.
Linux

Patch
Red Hat has updated the kernel. More info.
Friday 07 March 2025
NetApp

New
NetApp has published 10 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 8.1
Only 1 has patches.
More info.
Dell

Patch
Dell has published a Critical bulletin for PowerStore Family.
More info.
Linux

Patch
Ubuntu has updated the kernel. More info.
Thursday 06 March 2025
Moxa

Patch
Moxa PT switches are vulnerable to an authentication bypass because of flaws in their authorization mechanism. CVSSv4 score of 9.2
More info.
Synology

Patch
DSM product contain a vulnerability that allows a remote attacker to read any file via NFS. This is rated Important.
More info.
Jenkins

Patch
Several vulnerabilities have been patched in Jenkins core.
More info.
IBM

Patch
IBM has published Critical bulletins for SAN Volume Controller, Storwize, Spectrum Virtualize, and FlashSystem.
More info.
Dell

Patch
Dell has published a Critical bulletin for Secure Connect Gateway Security.
More info.
Wednesday 05 March 2025

Patch
Edimax

Exploit
IC-7100 IP Camera contains a vulnerability that allows a remote attacker to send specially crafted requests to achieve remote code execution on the device. CVSSv4 score of 9.3
Exploits are available, no response from vendor.
More info.
Weidmueller

Patch
Mozilla

Patch
Mozilla has published Critical and High bulletins for Thunderbird, Thunderbird ESR, Firefox, and Firefox ESR.
More info.
F5

Patch
A vulnerability in NGINX Unit allows a remote attacker to cause a degradation that can lead to a limited DoS. CVSSv4 score of 6.9
More info.
BD

Patch
BD has published Critical bulletins for BD MAX, IDM, Pyxis, Data Agent, Alaris, and CCE.
More info.
Linux

Patch
Ubuntu has updated the kernel. More info.
Tuesday 04 March 2025

Patch
Google has published the Android Monthly Patch bulletin, with 35 vulnerabilities plus MediaTek and Qualcomm patches. The most Critical vulnerabilities allow RCE.
More info.
Samsung

Patch
Monthly Patches for Android include 6 vulnerabilities, 1 rated High and 5 rated Moderate, plus Android patches.
More info.
Meinberg

Patch
Meinberg has updated LANTIME firmware to fix vulnerabilities in third-party software. Highest CVSSv3 score of 9.8
More info.
HP

Patch
ThinPro has been updated to fix vulnerabilities in third-party software. Highest CVSSv3 score of 9.8
More info.
IBM

Patch
IBM has published Critical bulletins for Watson Studio in Cloud Pak for Data, and Instana Observability. Highest CVSSv3 score of 9.8
More info.
BD

Patch
BD has published Critical bulletins for BACTEC FX and Assurity Linc.
More info.
Linux

Patch
Monday 03 March 2025
Qualcomm

Patch
Qualcomm has published Monthly Patches, 7 rated Critical, 5 rated High, and 2 rated Medium. Highest CVSSv4 score of 7.9
More info.
MediaTek

Patch
Monthly Patches include 10 bulletins, 3 rated High and 7 rated Medium. Highest CVSSv3 score of 8.2
More info.
Samsung

Patch
Samsung Semiconductor Monthly Patches include 6 bulletins, all rated Medium.
More info.
Veritas

New
A vulnerability in Arctera InfoScale where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. CVSSv3 score of 9.8
Only mitigations, no patches.
More info.
IBM

Patch
IBM has published Critical bulletins for SPSS Collaboration and Deployment Services, watsonx.data, and Cloud Pak for Business Automation.
More info.
Dell

Patch
Dell has published a Critical bulletin for Data Protection Search.
More info.
Friday 28 February 2025
Dario
Health

Patch
USB-C Blood Glucose Monitoring System Starter Kit Android Application, Application Database and Internet-based Server Infrastructure contain several vulnerabilities, including Information Disclosure, Improper storage of sensitive data, cleartext transmission of sensitive information, among others. Highest CVSSv4 score of 8.7
More info.
Synology

Patch
A vulnerability allows attackers to read any file via writable Network File System (NFS) service.
More info.
IBM

Patch
IBM has published Critical bulletins for Software Support, Cognos Analytics, and Watson Speech Services Cartridge.
More info.
NetApp

New
NetApp has published 10 new bulletins identifying third-party software included in their products. Highest CVSSv3 score of 9.8
One bulletin includes patches.
More info.
Linux

Patch
Ubuntu has updated the kernel. More info.
Thursday 27 February 2025
Extreme
Networks

Patch
ExtremeCloud IQ Controller contains a race condition in sshd that allows a remote attacker to achieve RCE as root.
More info.
Philips

New
Philips is reporting malicious, unauthorized versions of DICOM viewer have been identified.
Only download DICOM viewer from authorized Philips sources.
More info.
IBM

Patch
IBM has published Critical bulletins for IBM JRS, watsonx Orchestrate Cartridge, and TXSeries for Multiplatforms.
More info.
Dell

Patch
Dell has published Critical bulletins for Integrated System for Microsoft Azure Stack Hub and Secure Connect Gateway Policy Manager.
More info.
Wednesday 26 February 2025
Tuesday 25 February 2025
Monday 24 February 2025
Moxa

Patch
EN 50155 Switches are affected by an out-of-bounds write vulnerability that allows a remote attacker to cause a DoS. CVSSv4 score of 8.7
More info.
IBM

Patch
IBM has published Critical security bulletins for Cloud Pak for Multicloud Management, Data Virtualization on Cloud Pak for Data, and MaaS360 Cloud Extender.
More info.
Linux

Patch
Ubuntu has updated microcode. More info.
PRODUCT

GUARDED
This alert state represents the return towards normalisation of an alert state, indicating that there was a higher alert state due to a product vulnerability during the previous few days.
PRODUCT

INCREASED
This alert state indicates that a product vulnerability has been identified within the last few days. The vulnerability is either difficult to exploit, or if exploited, results in reduced impact to the target system.
PRODUCT

HIGH
This alert state indicates a more serious vulnerability which is exploitable.
PRODUCT

CRITICAL
This alert state indicates a significant threat to the product, where exploits exist or where the vulnerability is potentially devastating.

NEW
NEW
This bottom descriptor is used with a vulnerability which has been identified in the last 24 hours, with no patch or exploit. It will typically be paired with Increased.

+24hrs
+24hrs
This bottom descriptor is used with Indicates an alert state which has been present for more than 24 hours. It will typically be paired with Guarded, and could be changed to +48hr for an item that came out as Critical.

Patch
PATCH
This bottom descriptor indicates that patches are available for vulnerabilities, whether it is the initial report or a patch of a vulnerability that had been previously reported. It could be paired with Increased or High, and on rare occasions Critical.

Exploit
EXPLOIT
This bottom descriptor indicates that an Exploit has been made public for a vulnerability, whether it is the initial report or an indication of an exploit for a vulnerability that had been previously reported. It could be paired with High or Critical.

ZERO
ZERO DAY
This bottom descriptor indicates that a vulnerability has been announced without the opportunity for the vendor to patch it before the details are made known. It could be paired with High or Critical.