Title: Delta Electronics InfraSuite Device Master Deserialization of Untrusted Data
Published Date: Oct 29, 2024
Risk Index: 8.18 of 10 (High)
Summary: A critical vulnerability has been identified in the deserialization process of the Delta Electronics InfraSuite Device Master versions prior to 1.0.12. This vulnerability is associated with the Device-Gateway component, potentially allowing unauthorized access and manipulation of the system through deserialization of arbitrary .NET objects before authentication is enforced.
If exploited, this vulnerability could allow an attacker to execute arbitrary code in the context of the software running on InfraSuite Device Master. Given the nature of this centralized management system, successful exploitation could lead to unauthorized access to critical infrastructure systems, potentially resulting in data exfiltration, sabotage of operations, or disablement of essential monitoring devices.
Title: Improper Access Control in Elasticsearch
Published Date: Feb 11, 2015
Risk Index: 10.0 of 10 (Critical)
Summary: A critical vulnerability has been identified in the Groovy scripting engine of Elasticsearch versions before 1.3.8 and 1.4.x before 1.4.3. This vulnerability allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands through a crafted script.
If exploited, this vulnerability could allow an attacker to bypass all existing security measures to execute arbitrary shell commands, leading to unauthorized access, data leakage, or a completely compromised system capable of executing further malicious activities across connected networks or nodes.
Title: Authentication bypass using an alternate path or channel in Cisco Adaptive Security Appliance and Firepower Threat Defense
Published Date: Sep 06, 2023
Risk Index: 10.0 of 10 (Critical)
Summary:A critical vulnerability has been identified in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software, designated as CVE-2023-20269. This vulnerability could allow an unauthenticated, remote attacker to conduct a brute force attack to identify valid username and password combinations or enable an authenticated attacker to establish a clientless SSL VPN session with unauthorized access.
If exploited, this vulnerability could allow an attacker to gain unauthorized access, identify valid user credentials, or establish a clientless SSL VPN session, thereby breaching network security boundaries. This could lead to unauthorized data exfiltration, manipulation, or even a pathway for launching further attacks against internal networks.