Skip to main content

Vulnerability Details

The Computer Network Defence Alert State is designed to give a granular and more dynamic visualisation of the current cyber security threat.  Any increase in an alert state will occur immediately an issue is detected and it will drop again by one level each working day

Our rationale for this agility is that vulnerabilities often occur in clusters, therefore reducing the alert state again quickly, will increase your visibility of new threats to the same product. Daily reductions in alert state occur at approximately 1900 GMT/UTC. Significant vulnerabilities may remain for longer. Vulnerabilities on this page are predominantly remotely executable, very few local server exploits will be shown.

Wednesday 02 July 2025


Microsoft

Exploit

Microsoft has updated Edge with the latest chromium vulnerabilities.  Exploits are in the wild.
More info.


Festo

Patch

FESTO Hardware Controller and Hardware Servo Press Kit contain several vulnerabilities that could allow a remote attacker to execute unauthorized system commands with root privileges. Highest CVSSv3 score of 9.8
More info. And here.

FESTO and FESTO Didactic CIROS Studio / Education, Automation Suite, FluidDraw, FluidSIM, and MES-PC contain a vulnerability that allows a remote attacker to gain full control of the host system, including remote code execution. CVSSv3 score of 9.8
No patch available.
More info.


Voltronic

Patch

Voltronic Power Viewpower and PowerShield NetGuard contain vulnerabilities that allows a remote attacker to make configuration changes, resulting in shutting down UPS connected devices or execution of arbitrary code. CVSSv3 score of 9.8
No patch from Voltronic Power, PowerShield has patches available.
More info.


Contec

Patch

Contec has identified several vulnerabilities in its CHS Web HMI/SCADA software that allows a remote attacker to steal and tamper with data, execute malicious programs that could result in destruction of the system, and deactivate of certain function. Highest CVSSv3 score of 6.1
More info.


ModSecurity

Patch

In ModSecurity, if the variable SecParseXmlIntoArgs is set to On or OnlyArgs, and the request type is application/xml, and at least one XML tag is empty then a segmentation fault occurs. CVSSv3 score of 6.5
More info.


IBM

Patch

IBM has published Critical bulletins for Business Automation Workflow, Cloud Pak for Data, and PowerVC.
More info.


Linux

Patch

Red Hat has updated the kernel. More info.
AlmaLinux has updated the kernel. More info.


Tuesday 01 July 2025


Google

Patch

Google has published updates for Chrome for Desktop that fixes one security vulnerability rated High that is actively being exploited.
More info.

Microsoft is aware. More info.


Pilz

New

The Pilz industrial PC IndustrialPI webstatus application is vulnerable to a remote attacker through authentication bypass. CVSSv3 score of 9.8
More info.

Authentication is not configured by default for the Node-RED server on the Pilz industrial PC IndustrialPI. A remote attacker has full access to the Node-RED server. CVSSv3 score of 10
More info.


Tenable

Patch

Tenable has updated Security Center to fix 3rd party software vulnerabilities. Highest CVSSv3 score of 7.5
More info.


Mbed TLS

Patch

Eight new security bulletins have been published for Mbed TLS.
More info.


Linux

Patch

Red Hat has updated the microcode. More info.
OpenSUSE has updated the kernel. More info.
Ubuntu has updated the kernel. More info.


Monday 30 June 2025


Pilz

Patch

PiCtory has three vulnerabilities, 2 rated Critical, 1 rated Medium.  A remote attacker can bypass of authentication. Highest CVSSv3 score of 9.8
More info.


ifm electronic

New

A vulnerability has been disclosed in PLC ifm AC4xxS that allows a remote attacker to trigger the safety state resulting in a DoS. CVSSv3 score of 7.5
More info.


IBM

Patch

IBM has published Critical bulletins for Cloud Pak System Software, Tivoli System Automation Application Manager, Cognos Analytics, MQ, Sterling Connect:Direct Web Services, Storage Ceph, Personal Communications, Db2, App Connect Enterprise, Cloud Transformation Advisor, PowerVC, and WebSphere Service Registry and Repository.
More info.


Dell

Patch

Dell has published Critical bulletins for ObjectScale and NetWorker.
More info.


NetApp

New

NetApp has published 10 bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 9.8
More info.


Linux

Patch

Red Hat has updated the kernel. More info.
Rocky Linux 8 and 9 have updated the kernel. More info. And here.


Friday 27 June 2025


Microsoft

Patch

Microsoft has updated Edge with the latest chromium fixes and fixes for 3 Edge-specific vulnerabilities.
More info.


D-Link

New

D-Link has published 2 bulletins identifying vulnerabilities in EOS/EOL products. No fixes will be provided.
More info. And here.


IBM

Patch

IBM has published Critical bulletins for Storage Fusion Data Foundation, Cloud Pak for Multicloud Management, Cloud Pak for AIOps, Storage Protect, and Jazz for Service Management.
More info.


Dell

Patch

Dell has published Critical bulletins for PowerProtect Cyber Recovery, PowerMaxOS, PowerMax EEM, Unisphere for PowerMax, Unisphere 360, Solutions Enabler, Storage Resource Manager, Storage Monitoring and Reporting, and Secure Connect Gateway.
More info.


Linux

Patch

Oracle Linux has updated the kernel. More info.


Thursday 26 June 2025


Cisco

Patch

Cisco has published 2 new bulletins, 1 Critical and 1 Medium.  The Critical bulletin lists vulnerabilities in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) could allow a remote attacker to issue commands on the underlying operating system as the root user. CVSSv3 score of 10.
More info.


Broadcom

Patch

Broadcom has published 3 new bulletins for Tanzu, 1 rated Critical and 2 rated High. Highest CVSSv3 score of 9.8
More info.


Mitsubishi
Electric

Patch

An authentication bypass vulnerability exists in Mitsubishi Electric air conditioning systems that allows a remote attacker to bypass authentication and control the air conditioning systems or disclose information in them. In addition the attacker may tamper with firmware. CVSSv3 score of 9.8
More info.


Ricoh

Patch

Multiple security vulnerabilities exist in  Ricoh MFP and Printer Products affecting device firmware and BRAdmin Light. Highest CVSSv3 score of 8.1
More info.


IBM

Patch

IBM has published Critical bulletins for Sterling Connect, Db2, App Connect Enterprise, Cloud Transformation Advisor, PowerVC, and WebSphere Service Registry and Repository.
More info.


Linux

Patch

Oracle Linux has updated the kernel. More info.


Wednesday 25 June 2025


MICROSENS

Patch

MICROSENS NMP Web+ contains several vulnerabilities, including Use of Hard-coded, Security-relevant Constants and Insufficient Session Expiration. These could allow a remote attacker to generate forged JSON Web Tokens (JWT) to bypass authentication. Highest CVSSv4 score of 9.3
More info.


ControlID

Patch

ControlID iDSecure On-premises contains authentication, SQL Injection, and SSRF vulnerabilities. Highest CVSSv4 score of 9.3
More info.


Kaleris

Patch

Kaleris Navis N4 contains two vulnerabilities, including Deserialization of Untrusted Data and Cleartext Transmission of Sensitive Information. A remote attacker can make specially crafted requests to execute arbitrary code on the server. Highest CVSSV4 score of 9.3
More info.


Google

Patch

Google has updated Chrome for Desktop to fix 11 security vulnerabilities.
More info.

Microsoft is aware. More info.


Mozilla

Patch

Mozilla has published 3 bulletins rated High for Firefox and Firefox ESR.
More info.


GitLab

Patch

GitLab has published a patch release that fixes 5 vulnerabilities, 3 rated Medium and 2 rated Low. Highest CVSSv3 score of 6.5
More info.


Linux

Patch

SUSE has updated the kernel. More info.


Tuesday 24 June 2025


MB Connect

Patch

The mb24api endpoint reachable when connected via VPN is missing authentication for sensitive functions. This can allow a remote attacker to obtain limited sensitive information and cause a DoS. CVSSv3 score of 8.2
More info. And here.

Helmholz has published a bulletin for their use of this software.
More info.


Advantech

Patch

Several vulnerabilities have been identified in the WISE-4000LAN product line, including vulnerabilities in third-party software.  Highest CVSSv3 score of 9.8
More info.


Westermo

Patch

EDW-100 and EDW-120 serial to Ethernet converters contain vulnerabilities in AllegroSoft RomPager that could cause a DoS. CVSSv3 score of 7.5
More info.


Hitachi
Energy

Patch

Hitachi Energy Relion 670/650 and SAM600-IO series IED device contains a vulnerability that allows a remote attacker to cause a DoS. CVSSv4 score of 8.7
More info.

MSM is affected by a 2020 vulnerability in jQuery that could allow a remote attacker to impact the confidentiality, integrity or availability of MSM. CVSSv3 score of 6.1
More info.


Splunk

Patch

Splunk has published 4 third-party software bulletins, 1 rated Critical, 2 rated High, and 1 rated Medium.
More info.


Fortinet

Patch

A stack-based overflow vulnerability in FortiOS, FortiProxy, FortiPAM and FortiSwitchManager may allow a remote attacker to execute arbitrary code or command via crafted packets. CVSSv3 score of 6.7
More info.


Linux

Patch

Red Hat has updated the kernel. More info.
Oracle Linux has updated the kernel. More info.
Ubuntu has updated the kernel. More info.
Amazon Linux 2 and Amazon Linux 2023 have updated the kernel. More info. And here.


Monday 23 June 2025


Microsoft

Patch

Microsoft has updated Edge to apply the latest chromium-based fixes.
More info.


F5

Patch

BIG-IP Next CNF contains a vulnerability in Ruby that allows a remote attacker to smuggle a message to the client/server without the intermediary being aware of it. CVSSv3 score of 7.5
More info.


NetApp

New

NetApp has published 10 bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 7.6
More info.


IBM

Patch

IBM has published Critical bulletins for Jazz for Service Management, watsonx Assistant Cartridge, watsonx Orchestrate, and My webMethods Server.
More info.


PRODUCT

GUARDED 

This alert state represents the return towards normalisation of an alert state, indicating that there was a higher alert state due to a product vulnerability during the previous few days.


PRODUCT

INCREASED 

This alert state indicates that a product vulnerability has been identified within the last few days. The vulnerability is either difficult to exploit, or if exploited, results in reduced impact to the target system.


PRODUCT

HIGH 

This alert state indicates a more serious vulnerability which is exploitable.


PRODUCT

CRITICAL 

This alert state indicates a significant threat to the product, where exploits exist or where the vulnerability is potentially devastating.


NEW

NEW 

This bottom descriptor is used with a vulnerability which has been identified in the last 24 hours, with no patch or exploit. It will typically be paired with Increased.


+24hrs

+24hrs

 This bottom descriptor is used with Indicates an alert state which has been present for more than 24 hours. It will typically be paired with Guarded, and could be changed to +48hr for an item that came out as Critical.


Patch

PATCH 

This bottom descriptor indicates that patches are available for vulnerabilities, whether it is the initial report or a patch of a vulnerability that had been previously reported.  It could be paired with Increased or High, and on rare occasions Critical.


Exploit

EXPLOIT 

This bottom descriptor indicates that an Exploit has been made public for a vulnerability, whether it is the initial report or an indication of an exploit for a vulnerability that had been previously reported.  It could be paired with High or Critical.


ZERO

ZERO DAY 

This bottom descriptor indicates that a vulnerability has been announced without the opportunity for the vendor to patch it before the details are made known.  It could be paired with High or Critical.