Refine your search

66 vulnerabilities found for Security by ESET

CERTFR-2025-AVI-0727
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer un déni de service à distance et un problème de sécurité non spécifié par l'éditeur.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
ESET Server Security Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) sans le dernier correctif de sécurité
ESET Mail Security Mail Security pour Microsoft Exchange Server sans le dernier correctif de sécurité
ESET File Security File Security pour Microsoft Azure sans le dernier correctif de sécurité
ESET PROTECT On-Prem PROTECT On-Prem versions 12.1.x antérieures à 12.1.11.0
ESET Security Ultimate Security Ultimate sans le dernier correctif de sécurité
ESET Endpoint Antivirus Endpoint Antivirus pour Windows sans le dernier correctif de sécurité
ESET Endpoint Security Endpoint Security pour Windows sans le dernier correctif de sécurité
ESET Security Security pour Microsoft SharePoint Server sans le dernier correctif de sécurité
ESET Safe Server Safe Server sans le dernier correctif de sécurité
ESET Small Business Security Small Business Security sans le dernier correctif de sécurité
ESET PROTECT On-Prem PROTECT On-Prem versions 11.1.x antérieures à 11.1.18.0
ESET Smart Security Premium Smart Security Premium sans le dernier correctif de sécurité
ESET NOD32 Antivirus NOD32 Antivirus sans le dernier correctif de sécurité
ESET PROTECT On-Prem PROTECT On-Prem versions 12.0.x antérieures à 12.0.15.0
ESET Mail Security Mail Security pour IBM Domino sans le dernier correctif de sécurité
ESET Internet Security Internet Security sans le dernier correctif de sécurité
References
Bulletin de sécurité ESET ca8854 2025-08-21 vendor-advisory
Bulletin de sécurité ESET ca8853 2025-08-21 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Mail Security pour Microsoft Exchange Server sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "File Security pour Microsoft Azure sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "File Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "PROTECT On-Prem versions 12.1.x ant\u00e9rieures \u00e0 12.1.11.0",
      "product": {
        "name": "PROTECT On-Prem",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security Ultimate sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Antivirus pour Windows sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Security pour Windows sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security pour Microsoft SharePoint Server sans le dernier correctif de s\u00e9curit\u00e9\n\n",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Safe Server sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Safe Server",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Small Business Security sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Small Business Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "PROTECT On-Prem versions 11.1.x ant\u00e9rieures \u00e0 11.1.18.0",
      "product": {
        "name": "PROTECT On-Prem",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Smart Security Premium sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "NOD32 Antivirus sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "PROTECT On-Prem versions 12.0.x ant\u00e9rieures \u00e0 12.0.15.0",
      "product": {
        "name": "PROTECT On-Prem",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Mail Security pour IBM Domino sans le dernier correctif de s\u00e9curit\u00e9\n",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Internet Security sans le dernier correctif de s\u00e9curit\u00e9\n",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-8352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8352"
    },
    {
      "name": "CVE-2025-4952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4952"
    },
    {
      "name": "CVE-2025-48976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
    },
    {
      "name": "CVE-2025-48988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
    }
  ],
  "initial_release_date": "2025-08-25T00:00:00",
  "last_revision_date": "2025-08-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0727",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8854",
      "url": "https://support-feed.eset.com/link/15370/17124579/ca8854"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8853",
      "url": "https://support-feed.eset.com/link/15370/17124580/ca8853"
    }
  ]
}

CERTFR-2025-AVI-0623
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer une élévation de privilèges et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
ESET Endpoint Security Endpoint Security versions antérieures à 11.1.2062.0 pour Windows
ESET Small Business Security Small Business Security versions antérieures à 18.2.14.0
ESET Security Security versions 11.x antérieures à 11.1.15005.0 pour Microsoft SharePoint Server
ESET Mail Security Mail Security versions 11.x antérieures à 11.1.10013 pour Microsoft Exchange Server
ESET Internet Security Internet Security versions antérieures à 18.2.14.0
ESET Server Security Server Security versions 12.x antérieures à 12.0.12005.0 pour Windows
ESET Smart Security Premium Smart Security Premium versions antérieures à 18.2.14.0
ESET Security Security versions 12.x antérieures à 12.0.15005.0 pour Microsoft SharePoint Server
ESET Safe Server Safe Server versions antérieures à 18.2.14.0
ESET Security Ultimate Security Ultimate versions antérieures à 18.2.14.0
ESET Server Security Server Security versions 11.x antérieures à 11.1.12013.0 pour Windows
ESET Mail Security Mail Security versions 12.x antérieures à 12.0.10004.0 pour Microsoft Exchange Server
ESET Endpoint Antivirus Endpoint Antivirus versions antérieures à 12.0.2058.0 pour Windows
ESET NOD32 Antivirus NOD32 Antivirus versions antérieures à 18.2.14.0
References
Bulletin de sécurité ESET ca8840 2025-07-16 vendor-advisory
Bulletin de sécurité ESET ca8838 2025-07-09 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2062.0 pour Windows",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Small Business Security versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "Small Business Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security versions 11.x ant\u00e9rieures \u00e0 11.1.15005.0 pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Mail Security versions 11.x ant\u00e9rieures \u00e0 11.1.10013 pour Microsoft Exchange Server",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Internet Security versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Server Security versions 12.x ant\u00e9rieures \u00e0 12.0.12005.0 pour Windows",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Smart Security Premium versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security versions 12.x ant\u00e9rieures \u00e0 12.0.15005.0 pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Safe Server versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "Safe Server",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security Ultimate versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Server Security versions 11.x ant\u00e9rieures \u00e0 11.1.12013.0 pour Windows",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Mail Security versions 12.x ant\u00e9rieures \u00e0 12.0.10004.0 pour Microsoft Exchange Server",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 12.0.2058.0 pour Windows",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "NOD32 Antivirus versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-5028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5028"
    },
    {
      "name": "CVE-2025-2425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2425"
    }
  ],
  "initial_release_date": "2025-07-25T00:00:00",
  "last_revision_date": "2025-07-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0623",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": "2025-07-16",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8840",
      "url": "https://support-feed.eset.com/link/15370/17103529/ca8840"
    },
    {
      "published_at": "2025-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8838",
      "url": "https://support-feed.eset.com/link/15370/17103530/ca8838"
    }
  ]
}

CERTFR-2025-AVI-0280
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
ESET Smart Security Premium Smart Security Premium versions antériéures à 18.1.10.0
ESET Server Security Server Security versions antérieures à 11.1.12009.0 pour Windows Server
ESET NOD32 Antivirus NOD32 Antivirus versions antériéures à 18.1.10.0
ESET Internet Security Internet Security versions antériéures à 18.1.10.0
ESET Endpoint Security Endpoint Security versions antérieures à 12.0.2045.0
ESET Endpoint Antivirus Endpoint Antivirus versions antérieures à 12.0.2045.0
ESET Mail Security Mail Security versions antérieures à 11.1.10011.0, 11.0.10010.0 et 10.1.10017.0 pour Microsoft Exchange Server
ESET Security Ultimate Security Ultimate versions antériéures à 18.1.10.0
ESET Endpoint Antivirus Endpoint Antivirus versions antérieures à 11.1.2059.0
ESET Security Security versions antérieures à 11.1.15003.0, 11.0.15007.0, 10.0.15008.0 pour Microsoft SharePoint Server
ESET Safe Server ESET Safe Server versions antérieures à 18.1.10.0
ESET Endpoint Security Endpoint Security versions antérieures à 11.1.2059.0
ESET Small Business Security Small Business Security versions antérieures à 18.1.10.0
References
Bulletin de sécurité ESET CA8810 2025-04-04 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Smart Security Premium versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Server Security versions ant\u00e9rieures \u00e0 11.1.12009.0 pour Windows Server",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "NOD32 Antivirus versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Internet Security versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Security versions ant\u00e9rieures \u00e0 12.0.2045.0",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 12.0.2045.0",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Mail Security versions ant\u00e9rieures \u00e0 11.1.10011.0, 11.0.10010.0 et 10.1.10017.0 pour Microsoft Exchange Server",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security Ultimate versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 11.1.2059.0",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security versions ant\u00e9rieures \u00e0 11.1.15003.0, 11.0.15007.0, 10.0.15008.0 pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Safe Server versions ant\u00e9rieures \u00e0 18.1.10.0",
      "product": {
        "name": "Safe Server",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2059.0",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Small Business Security versions ant\u00e9rieures \u00e0 18.1.10.0",
      "product": {
        "name": "Small Business Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-11859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11859"
    }
  ],
  "initial_release_date": "2025-04-07T00:00:00",
  "last_revision_date": "2025-04-07T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0280",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": "2025-04-04",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET CA8810",
      "url": "https://support-feed.eset.com/link/15370/16999046/ca8810"
    }
  ]
}

CERTFR-2024-AVI-0801
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer une élévation de privilèges et un déni de service.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
ESET Safe Server ESET Safe Server sans le correctif de sécurité Cleaner module 1251
ESET Small Business Security ESET Small Business Security sans le correctif de sécurité Cleaner module 1251
ESET Security Ultimate ESET Security Ultimate sans le correctif de sécurité Cleaner module 1251
ESET Endpoint Security ESET Endpoint Security sans le correctif de sécurité Cleaner module 1251 pour Windows
ESET File Security ESET File Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft Azure
ESET NOD32 Antivirus ESET NOD32 Antivirus sans le correctif de sécurité Cleaner module 1251
ESET Internet Security ESET Internet Security sans le correctif de sécurité Cleaner module 1251
ESET Mail Security ESET Mail Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft Exchange Server et IBM Domino
ESET Smart Security Premium ESET Smart Security Premium sans le correctif de sécurité Cleaner module 1251
ESET Server Security ESET Server Security sans le correctif de sécurité Cleaner module 1251 pour Windows Server
ESET Endpoint Security ESET Endpoint Security versions antérieures à 8.0.7200.0 pour macOS
ESET Cyber Security ESET Cyber Security versions antérieures à 7.5.74.0
ESET Endpoint Antivirus ESET Endpoint Antivirus sans le correctif de sécurité Cleaner module 1251
ESET Security ESET Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft SharePoint Server
References
Bulletin de sécurité ESET ca8725 2024-09-20 vendor-advisory
Bulletin de sécurité ESET ca8726 2024-09-20 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ESET Safe Server sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Safe Server",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Small Business Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Small Business Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security Ultimate sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Windows",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET File Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft Azure",
      "product": {
        "name": "File Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET NOD32 Antivirus sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Internet Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft Exchange Server et IBM Domino ",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Smart Security Premium sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Windows Server",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Security versions ant\u00e9rieures \u00e0 8.0.7200.0 pour macOS ",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Cyber Security versions ant\u00e9rieures \u00e0 7.5.74.0 ",
      "product": {
        "name": "Cyber Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-6654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6654"
    },
    {
      "name": "CVE-2024-7400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7400"
    }
  ],
  "initial_release_date": "2024-09-23T00:00:00",
  "last_revision_date": "2024-09-23T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0801",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": "2024-09-20",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8725",
      "url": "https://support-feed.eset.com/link/15370/16815452/ca8725"
    },
    {
      "published_at": "2024-09-20",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8726",
      "url": "https://support-feed.eset.com/link/15370/16815451/ca8726"
    }
  ]
}

CERTFR-2024-AVI-0581
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une atteinte à l'intégrité des données et un déni de service.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
ESET Smart Security Premium ESET Smart Security Premium versions antérieures à 17.2.7.0
ESET Mail Security ESET Mail Security versions antérieures à 11.0.10008.0 pour Microsoft Exchange Server
ESET Security ESET Security versions antérieures à 11.0.15004.0 pour Microsoft SharePoint Server
ESET Server Security ESET Server Security versions antérieures à 11.0.12012.0 pour Windows Server
ESET Endpoint Antivirus ESET Endpoint Antivirus versions antérieures à 11.1.2039.0 pour Windows
ESET Security Ultimate ESET Security Ultimate versions antérieures à 17.2.7.0
ESET Internet Security ESET Internet Security versions antérieures à 17.2.7.0
ESET Endpoint Security ESET Endpoint Security versions antérieures à 11.1.2039.0 pour Windows
ESET NOD32 Antivirus ESET NOD32 Antivirus versions antérieures à 17.2.7.0
References
Bulletin de sécurité ESET ca8688 2024-07-12 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ESET Smart Security Premium versions ant\u00e9rieures \u00e0 17.2.7.0",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security versions ant\u00e9rieures \u00e0 11.0.10008.0 pour Microsoft Exchange Server",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security versions ant\u00e9rieures \u00e0 11.0.15004.0 pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security versions ant\u00e9rieures \u00e0 11.0.12012.0 pour Windows Server",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus versions ant\u00e9rieures \u00e0 11.1.2039.0 pour Windows",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security Ultimate versions ant\u00e9rieures \u00e0 17.2.7.0",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": " ESET Internet Security versions ant\u00e9rieures \u00e0 17.2.7.0",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2039.0 pour Windows",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET NOD32 Antivirus versions ant\u00e9rieures \u00e0 17.2.7.0",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-3779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3779"
    }
  ],
  "initial_release_date": "2024-07-15T00:00:00",
  "last_revision_date": "2024-07-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0581",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": "2024-07-12",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8688",
      "url": "https://support-feed.eset.com/link/15370/16741922/ca8688"
    }
  ]
}

CERTFR-2024-AVI-0136
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security ESET Security pour Microsoft SharePoint Server versions 7.3.x.x antérieures à 7.3.15006.0
ESET N/A ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security Premium et ESET Security Ultimate versions antérieures à 17.0.10.0
ESET Mail Security ESET Mail Security pour IBM Domino versions 10.0.x.x antérieures à 10.0.14007.0
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server versions 10.1.x.x antérieures à 10.1.10014.0
ESET Security ESET Security pour Microsoft SharePoint Server versions 9.0.x.x antérieures à 9.0.15006.0
ESET Mail Security ESET Mail Security pour IBM Domino versions 7.3.x.x antérieures à 7.3.14006.0
ESET N/A ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 10.0.x.x antérieures à 10.0.12015.0
ESET Mail Security ESET Mail Security pour IBM Domino versions 8.0.x.x antérieures à 8.0.14014.0
ESET N/A ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.1.x.x antérieures à 10.1.2063.0
ESET N/A ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.0.x.x antérieures à 10.0.2052.0
ESET N/A ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 7.3.x.x antérieures à 7.3.12013.0
ESET N/A ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 8.1.x.x antérieures à 8.1.2062.0
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server versions 9.0.x.x antérieures à 9.0.10012.0
ESET N/A ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 8.0.x.x antérieures à 8.0.12016.0
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server versions 8.0.x.x antérieures à 8.0.10024.0
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server versions 7.3.x.x antérieures à 7.3.10018.0
ESET Security ESET Security pour Microsoft SharePoint Server versions 8.0.x.x antérieures à 8.0.15012.0
ESET Security ESET Security pour Microsoft SharePoint Server versions 10.0.x.x antérieures à 10.0.15005.0
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server versions 10.0.x.x antérieures à 10.0.10018.0
ESET N/A ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 9.1.x.x antérieures à 9.1.2071.0
ESET Mail Security ESET Mail Security pour IBM Domino versions 9.0.x.x antérieures à 9.0.14008.0
ESET N/A ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 9.0.x.x antérieures à 9.0.12019.0
ESET N/A ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 11.0.x.x antérieures à 11.0.2032.0
ESET File Security ESET File Security pour Microsoft Azure

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ESET Security pour Microsoft SharePoint Server versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.15006.0",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security Premium et ESET Security Ultimate versions ant\u00e9rieures \u00e0 17.0.10.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour IBM Domino versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.14007.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server versions 10.1.x.x ant\u00e9rieures \u00e0 10.1.10014.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security pour Microsoft SharePoint Server versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.15006.0",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour IBM Domino versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.14006.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.12015.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour IBM Domino versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.14014.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.1.x.x ant\u00e9rieures \u00e0 10.1.2063.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.2052.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.12013.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 8.1.x.x ant\u00e9rieures \u00e0 8.1.2062.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.10012.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.12016.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.10024.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.10018.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security pour Microsoft SharePoint Server versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.15012.0",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security pour Microsoft SharePoint Server versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.15005.0",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.10018.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 9.1.x.x ant\u00e9rieures \u00e0 9.1.2071.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour IBM Domino versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.14008.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.12019.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 11.0.x.x ant\u00e9rieures \u00e0 11.0.2032.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET File Security pour Microsoft Azure",
      "product": {
        "name": "File Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-0353",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0353"
    }
  ],
  "initial_release_date": "2024-02-15T00:00:00",
  "last_revision_date": "2024-02-15T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 ESET\u00a0CA8612 du 14 f\u00e9vrier 2024",
      "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed"
    }
  ],
  "reference": "CERTFR-2024-AVI-0136",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits ESET\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 ESET CA8612 du 14 f\u00e9vrier 2024",
      "url": null
    }
  ]
}

CERTFR-2023-AVI-1053
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security Ultimate ESET Security Ultimate
ESET Endpoint Antivirus ESET Endpoint Antivirus versions postérieures à 10.0 pour Linux
ESET Server Security ESET Server Security versions postérieures à 10.1 pour Linux
ESET Endpoint Antivirus ESET Endpoint Antivirus pour Windows
ESET NOD32 Antivirus ESET NOD32 Antivirus
ESET Endpoint Security ESET Endpoint Security pour Windows
ESET Smart Security Premium ESET Smart Security Premium
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server
ESET Internet Security ESET Internet Security
ESET Server Security ESET Server Security pour Windows Server
ESET Mail Security ESET Mail Security pour IBM Domino
ESET Security ESET Security pour Microsoft SharePoint Server
ESET File Security ESET File Security pour Microsoft Azure

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ESET Security Ultimate",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus versions post\u00e9rieures \u00e0 10.0 pour Linux",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security versions post\u00e9rieures \u00e0 10.1 pour Linux",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET NOD32 Antivirus",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Security pour Windows",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Smart Security Premium",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Internet Security",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security pour Windows Server",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour IBM Domino",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET File Security pour Microsoft Azure",
      "product": {
        "name": "File Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-5594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5594"
    }
  ],
  "initial_release_date": "2023-12-22T00:00:00",
  "last_revision_date": "2023-12-22T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 ESET\u00a0CA8562 du 20 d\u00e9cembre 2023",
      "url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed"
    }
  ],
  "reference": "CERTFR-2023-AVI-1053",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-12-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits ESET\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 ESET CA8562 du 20 d\u00e9cembre 2023",
      "url": null
    }
  ]
}

CERTFR-2023-AVI-0764
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits TrendMicro. Elle permet à un attaquant de provoquer une exécution de code arbitraire.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security TrendMicro Worry-Free Business Security en mode SaaS (WFBSS) sans le correctif mensuel de maintenance du 31 juillet 2023
Trend Micro Apex One TrendMicro Apex One versions 2019 (On-prem) sans le correctif de sécurité SP1 Patch 1 (B12380)
Trend Micro Apex One TrendMicro Apex One en mode SaaS sans le correctif mensuel de sécurité du mois de juillet 2023 (202307)
ESET Security TrendMicro Worry-Free Business Security (WFBS) version 10.0 SP1 sans le correctif de sécurité SP1 Patch 2495

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "TrendMicro Worry-Free Business Security en mode SaaS (WFBSS) sans le correctif mensuel de maintenance du 31 juillet 2023",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "TrendMicro Apex One versions 2019 (On-prem) sans le correctif de s\u00e9curit\u00e9 SP1 Patch 1 (B12380)",
      "product": {
        "name": "Apex One",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "TrendMicro Apex One en mode SaaS sans le correctif mensuel de s\u00e9curit\u00e9 du mois de juillet 2023 (202307)",
      "product": {
        "name": "Apex One",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "TrendMicro Worry-Free Business Security (WFBS) version 10.0 SP1 sans le correctif de s\u00e9curit\u00e9 SP1 Patch 2495",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-41179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41179"
    }
  ],
  "initial_release_date": "2023-09-20T00:00:00",
  "last_revision_date": "2023-09-20T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro\u00a0000294994 du 19 septembre 2023",
      "url": "https://success.trendmicro.com/dcx/s/solution/000294994?language=en_US"
    }
  ],
  "reference": "CERTFR-2023-AVI-0764",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-09-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits TrendMicro\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits TrendMicro",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000294994 du 19 septembre 2023",
      "url": null
    }
  ]
}

CERTFR-2023-AVI-0755
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits F-Secure. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Microsoft Windows WithSecure Endpoint Protection pour Windows sans le correctif de sécurité automatique 2023-09-11_07
ESET Server Security WithSecure Server Security versions 15 sans le correctif de sécurité automatique 2023-09-11_07
ESET Security WithSecure Client Security versions 15 sans le correctif de sécurité automatique 2023-09-11_07
WithSecure N/A WithSecure Endpoint Protection pour Mac sans le correctif de sécurité automatique 2023-09-11_07
N/A N/A Linux Protection versions 12.0 sans le correctif de sécurité automatique 2023-09-11_07
ESET Security Linux Security 64 versions 12.0 sans le correctif de sécurité automatique 2023-09-11_07
ESET Server Security WithSecure Email and Server Security versions 15 sans le correctif de sécurité automatique 2023-09-11_07
ESET Security WithSecure Client Security pour Mac versions 15 sans le correctif de sécurité automatique 2023-09-11_07
WithSecure N/A WithSecure Endpoint Protection pour Linux sans le correctif de sécurité automatique 2023-09-11_07
WithSecure N/A WithSecure Elements Endpoint Protection versions 17 sans le correctif de sécurité automatique 2023-09-11_07
WithSecure N/A WithSecure Atlant (anciennement F-Secure Atlant) versions 1.0.35-1 sans le correctif de sécurité automatique 2023-09-11_07
WithSecure N/A WithSecure Elements Endpoint Protection pour Mac 17 sans le correctif de sécurité automatique 2023-09-11_07

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WithSecure Endpoint Protection pour Windows sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Server Security versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Client Security versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Endpoint Protection pour Mac sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "Linux Protection versions 12.0 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Linux Security 64 versions 12.0 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Email and Server Security versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Client Security pour Mac versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Endpoint Protection pour Linux sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Elements Endpoint Protection versions 17 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Atlant (anciennement F-Secure Atlant) versions 1.0.35-1 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Elements Endpoint Protection pour Mac 17 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-42523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42523"
    },
    {
      "name": "CVE-2023-42521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42521"
    },
    {
      "name": "CVE-2023-42524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42524"
    },
    {
      "name": "CVE-2023-42526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42526"
    },
    {
      "name": "CVE-2023-42522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42522"
    }
  ],
  "initial_release_date": "2023-09-15T00:00:00",
  "last_revision_date": "2023-09-15T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure\u00a0cve-2023-42521 du 14 septembre 2023",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42521"
    }
  ],
  "reference": "CERTFR-2023-AVI-0755",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-09-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits F-Secure\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42523 du 14 septembre 2023",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42523"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42521 du 14 septembre 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42526 du 14 septembre 2023",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42526"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42522 du 14 septembre 2023",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42522"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42524 du 14 septembre 2023",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42524"
    }
  ]
}

CERTFR-2023-AVI-0384
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans TrendMicro Mobile Security (entreprise). Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security TrendMicro Mobile Security (entreprise) version 9.8 SP5 sans le correctif de sécurité B3284
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "TrendMicro Mobile Security (entreprise) version 9.8 SP5 sans le correctif de s\u00e9curit\u00e9 B3284",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-32523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32523"
    },
    {
      "name": "CVE-2023-32526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32526"
    },
    {
      "name": "CVE-2023-32527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32527"
    },
    {
      "name": "CVE-2023-32528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32528"
    },
    {
      "name": "CVE-2023-32521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32521"
    },
    {
      "name": "CVE-2023-32522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32522"
    },
    {
      "name": "CVE-2023-32524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32524"
    },
    {
      "name": "CVE-2023-32525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32525"
    }
  ],
  "initial_release_date": "2023-05-15T00:00:00",
  "last_revision_date": "2023-05-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0384",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-05-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eTrendMicro Mobile Security (entreprise)\u003c/span\u003e. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une atteinte\n\u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans TrendMicro Mobile Security (entreprise)",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000293106 du 12 mai 2023",
      "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US"
    }
  ]
}

CERTFR-2023-AVI-0217
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans TrendMicro Worry-Free Business Security. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à l'intégrité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security WFBSS versions antérieures à février 2023
ESET Security WFBS version 10.0 SP1 sans le dernier correctif de sécurité 2459
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WFBSS versions ant\u00e9rieures \u00e0 f\u00e9vrier 2023",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WFBS version 10.0 SP1 sans le dernier correctif de s\u00e9curit\u00e9 2459",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-25146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25146"
    },
    {
      "name": "CVE-2023-25144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25144"
    },
    {
      "name": "CVE-2022-45797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45797"
    },
    {
      "name": "CVE-2023-25148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25148"
    },
    {
      "name": "CVE-2023-25145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25145"
    },
    {
      "name": "CVE-2023-25147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25147"
    }
  ],
  "initial_release_date": "2023-03-14T00:00:00",
  "last_revision_date": "2023-03-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0217",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-03-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans TrendMicro\nWorry-Free Business Security. Elles permettent \u00e0 un attaquant de\nprovoquer un contournement de la politique de s\u00e9curit\u00e9, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans TrendMicro Worry-Free Business Security",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292454 du 13 mars 2023",
      "url": "https://success.trendmicro.com/dcx/s/solution/000292454"
    }
  ]
}

CERTFR-2023-AVI-0106
Vulnerability from certfr_avis

De multiples vulnérabilités ont été corrigées dans TrendMicro. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une élévation de privilèges et une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Trend Micro Apex One Apex One 2019 sans le correctif de sécurité SP1 b11564
ESET Security Worry-Free Business Security 10.0 SP1 sans le correctif de sécurité Patch 2454
N/A N/A Apex One as a Service sans le correctif de sécurité Build 202301 Security Agent version: 14.0.11960
ESET Security Worry-Free Business Security Services sans le correctif de sécurité (6.7.3064 / 14.2.3044)

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Apex One 2019 sans le correctif de s\u00e9curit\u00e9 SP1 b11564",
      "product": {
        "name": "Apex One",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Worry-Free Business Security 10.0 SP1 sans le correctif de s\u00e9curit\u00e9 Patch 2454",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Apex One as a Service sans le correctif de s\u00e9curit\u00e9 Build 202301 Security Agent version: 14.0.11960",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Worry-Free Business Security Services sans le correctif de s\u00e9curit\u00e9 (6.7.3064 / 14.2.3044)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-25143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25143"
    },
    {
      "name": "CVE-2022-44649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44649"
    },
    {
      "name": "CVE-2023-25146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25146"
    },
    {
      "name": "CVE-2023-25144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25144"
    },
    {
      "name": "CVE-2023-0587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0587"
    },
    {
      "name": "CVE-2022-44650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44650"
    },
    {
      "name": "CVE-2022-45798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45798"
    },
    {
      "name": "CVE-2023-25148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25148"
    },
    {
      "name": "CVE-2023-25145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25145"
    },
    {
      "name": "CVE-2023-25147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25147"
    }
  ],
  "initial_release_date": "2023-02-09T00:00:00",
  "last_revision_date": "2023-02-09T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292209 du 09 f\u00e9vrier 2023",
      "url": "https://success.trendmicro.com/dcx/s/solution/000292209?language=en_US"
    }
  ],
  "reference": "CERTFR-2023-AVI-0106",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-02-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eTrendMicro\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un contournement de la politique de s\u00e9curit\u00e9, une \u00e9l\u00e9vation de\nprivil\u00e8ges et une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits TrendMicro",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292209 du 08 f\u00e9vrier 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292202 du 08 f\u00e9vrier 2023",
      "url": "https://success.trendmicro.com/dcx/s/solution/000292202?language=en_US"
    }
  ]
}

CERTFR-2022-AVI-833
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Contournement provisoire

None
Impacted products
Vendor Product Description
Microsoft Windows WithSecure Endpoint Protection pour Windows 32-bit sans le correctif de sécurité automatique Capricorn 2022-09-13_07
WithSecure N/A WithSecure Collaboration Protection sans le correctif de sécurité automatique Capricorn 2022-09-13_07
ESET Security F-Secure Linux Security 32 sans le correctif de sécurité automatique Capricorn 2022-09-13_07
N/A N/A F-Secure Internet Gatekeeper sans le correctif de sécurité automatique Capricorn 2022-09-13_07
WithSecure N/A WithSecure Cloud Protection for Salesforce sans le correctif de sécurité automatique Capricorn 2022-09-13_07
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WithSecure Endpoint Protection pour Windows 32-bit sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Collaboration Protection sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security 32 sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Internet Gatekeeper sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Cloud Protection for Salesforce sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\n## Contournement provisoire\n",
  "cves": [
    {
      "name": "CVE-2022-28886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28886"
    }
  ],
  "initial_release_date": "2022-09-20T00:00:00",
  "last_revision_date": "2022-09-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-833",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-09-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28886 du 19 septembre 2022",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28886"
    }
  ]
}

CERTFR-2022-AVI-764
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans F-Secure les produits F-Secure. Elles permettent à un attaquant de provoquer un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Microsoft N/A F-Secure Internet Gatekeeper
N/A N/A F-Secure Atlant
ESET Security F-Secure Linux Security 64
Microsoft Windows Produits WithSecure Endpoint Protection pour Windows et Mac
WithSecure N/A WithSecure Collaboration Protection
WithSecure N/A WithSecure Cloud Protection for Salesforce
ESET Security F-Secure Linux Security (32-bit)
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "F-Secure Internet Gatekeeper",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Atlant",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security 64",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Produits WithSecure Endpoint Protection pour Windows et Mac",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Collaboration Protection",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Cloud Protection for Salesforce",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security (32-bit)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-28883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28883"
    },
    {
      "name": "CVE-2022-28882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28882"
    }
  ],
  "initial_release_date": "2022-08-24T00:00:00",
  "last_revision_date": "2022-08-24T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-764",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-08-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans F-Secure les\nproduits F-Secure. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28883 du 23 ao\u00fbt 2022",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28883"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28882 du 23 ao\u00fbt 2022",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28882"
    }
  ]
}

CERTFR-2022-AVI-708
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
N/A N/A F-Secure Internet Gatekeeper
N/A N/A F-Secure Atlant
Microsoft Windows Les produits WithSecure endpoint protection pour Windows et Mac
WithSecure N/A WithSecure Collaboration Protection
WithSecure N/A WithSecure Cloud Protection for Salesforce
ESET Security F-Secure Linux Security (64-bit)
ESET Security F-Secure Linux Security (32-bit)
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "F-Secure Internet Gatekeeper",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Atlant",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Les produits WithSecure endpoint protection pour Windows et Mac",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Collaboration Protection",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Cloud Protection for Salesforce",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security (64-bit)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security (32-bit)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-28880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28880"
    }
  ],
  "initial_release_date": "2022-08-04T00:00:00",
  "last_revision_date": "2022-08-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-708",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-08-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans F-Secure. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28880 du 03 ao\u00fbt 2022",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28880"
    }
  ]
}

CERTFR-2022-AVI-433
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET N/A F-Secure Cloud Protection for Salesforce sans le correctif de sécurité HydraLinux update 2022-04-12_01
N/A N/A F-Secure Internet Gatekeeper sans le correctif de sécurité HydraLinux update 2022-04-12_01
Microsoft Windows WithSecure Endpoint Protection sur Windows et Mac sans le correctif de sécurité HydraLinux update 2022-04-12_01
Microsoft N/A F-Secure Elements for Microsoft 365 sans le correctif de sécurité HydraLinux update 2022-04-12_01
N/A N/A F-Secure Atlant sans le correctif de sécurité HydraLinux update 2022-04-12_01
ESET Security F-Secure Linux Security (32-bit) sans le correctif de sécurité HydraLinux update 2022-04-12_01
ESET Security F-Secure Linux Security 64 sans le correctif de sécurité HydraLinux update 2022-04-12_01
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "F-Secure Cloud Protection for Salesforce sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Internet Gatekeeper sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Endpoint Protection sur Windows et Mac sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Elements for Microsoft 365 sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Atlant sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security (32-bit) sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security 64 sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-28871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28871"
    }
  ],
  "initial_release_date": "2022-05-10T00:00:00",
  "last_revision_date": "2022-05-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-433",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-05-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure du 25 avril 2022",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28871"
    }
  ]
}

CERTFR-2022-AVI-128
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service.

Solution

Le correctif a été déployé automatiquement lors de la mise jour Capricorn update 2022-02-01_01, cf. le bulletin de sécurité de l'éditeur (cf. section Documentation).

None
Impacted products
Vendor Product Description
N/A N/A F-Secure Internet Gatekeeper
ESET Security F-Secure Security Cloud
N/A N/A F-Secure Atlant
ESET Security F-Secure Linux Security 64
Microsoft Windows F-Secure All F-Secure Endpoint Protection products on Windows and Mac
ESET Security F-Secure Linux Security (32-bit)

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "F-Secure Internet Gatekeeper",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Security Cloud",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Atlant",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security 64",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure All F-Secure Endpoint Protection products on Windows and Mac",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security (32-bit)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nLe correctif a \u00e9t\u00e9 d\u00e9ploy\u00e9 automatiquement lors de la mise jour\n*Capricorn update 2022-02-01_01,* cf. le bulletin de s\u00e9curit\u00e9 de\nl\u0027\u00e9diteur (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-40837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40837"
    }
  ],
  "initial_release_date": "2022-02-09T00:00:00",
  "last_revision_date": "2022-02-09T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2021-40837 du 9 f\u00e9vrier 2022",
      "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837"
    }
  ],
  "reference": "CERTFR-2022-AVI-128",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-02-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2021-40837 du 09 f\u00e9vrier 2022",
      "url": null
    }
  ]
}

CERTFR-2022-AVI-095
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctif (cf. section Documentation).

Contournement provisoire

L'éditeur propose une mesure de contournement si l'installation des correctifs n'est pas envisageable (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security ESET Security for Microsoft SharePoint Server versions antérieures à 8.0.15006.0 (mise à jour du 16 décembre 2021)
ESET Security ESET Security for Microsoft SharePoint Server versions antérieures à 7.3.15002.0 (mise à jour du 12 janvier 2022)
ESET Mail Security ESET Mail Security for IBM Domino versions antérieures à 7.3.14003.0 (mise à jour du 26 janvier 2022)
ESET N/A ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions antérieures à 8.0.2028.3, 8.0.2028.4, 8.0.2039.3, 8.0.2039.4, 8.0.2044.3, 8.0.2044.4, 8.1.2031.3, 8.1.2031.4, 8.1.2037.9 et 8.1.2037.10 (mise à jour du 25 janvier 2022)
ESET N/A ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions antérieures à 7.3.2055.0 et 7.3.2055.1 (mise à jour du 31 janvier 2022)
ESET File Security ESET File Security for Microsoft Windows Server versions antérieures à 7.3.12008.0 (mise à jour du 12 janvier 2022)
ESET N/A ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security et ESET Smart Security versiosn antérieures à 15.0.19.0 (mise à jour du 8 décembre 2021)
ESET Server Security ESET Server Security for Microsoft Windows Server versions antérieures à 8.0.12010.0 (mise à jour du 16 décembre 2021)
ESET Mail Security ESET Mail Security for IBM Domino versions antérieures à 8.0.14006.0 (mise à jour du 16 décembre 2021)
ESET Mail Security ESET Mail Security for Microsoft Exchange Server versions antérieures à 7.3.10014.0 (mise à jour du 26 janvier 2022)
ESET N/A ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions antérieures à 9.0.2032.6 et 9.0.2032.7 (mise à jour du 16 décembre 2021)
ESET Mail Security ESET Mail Security for Microsoft Exchange Server versions antérieures à 8.0.10018.0 (mise à jour du 16 décembre 2021)
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ESET Security for Microsoft SharePoint Server versions ant\u00e9rieures \u00e0 8.0.15006.0 (mise \u00e0 jour du 16 d\u00e9cembre 2021)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security for Microsoft SharePoint Server versions ant\u00e9rieures \u00e0 7.3.15002.0 (mise \u00e0 jour du 12 janvier 2022)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security for IBM Domino versions ant\u00e9rieures \u00e0 7.3.14003.0 (mise \u00e0 jour du 26 janvier 2022)",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions ant\u00e9rieures \u00e0 8.0.2028.3, 8.0.2028.4, 8.0.2039.3, 8.0.2039.4, 8.0.2044.3, 8.0.2044.4, 8.1.2031.3, 8.1.2031.4, 8.1.2037.9 et 8.1.2037.10 (mise \u00e0 jour du 25 janvier 2022)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions ant\u00e9rieures \u00e0 7.3.2055.0 et 7.3.2055.1 (mise \u00e0 jour du 31 janvier 2022)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET File Security for Microsoft Windows Server versions ant\u00e9rieures \u00e0 7.3.12008.0 (mise \u00e0 jour du 12 janvier 2022)",
      "product": {
        "name": "File Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security et ESET Smart Security versiosn ant\u00e9rieures \u00e0 15.0.19.0 (mise \u00e0 jour du 8 d\u00e9cembre 2021)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security for Microsoft Windows Server versions ant\u00e9rieures \u00e0 8.0.12010.0 (mise \u00e0 jour du 16 d\u00e9cembre 2021)",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security for IBM Domino versions ant\u00e9rieures \u00e0 8.0.14006.0 (mise \u00e0 jour du 16 d\u00e9cembre 2021)",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security for Microsoft Exchange Server versions ant\u00e9rieures \u00e0 7.3.10014.0 (mise \u00e0 jour du 26 janvier 2022)",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions ant\u00e9rieures \u00e0 9.0.2032.6 et 9.0.2032.7 (mise \u00e0 jour du 16 d\u00e9cembre 2021)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security for Microsoft Exchange Server versions ant\u00e9rieures \u00e0 8.0.10018.0 (mise \u00e0 jour du 16 d\u00e9cembre 2021)",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectif (cf. section Documentation).\n\n## Contournement provisoire\n\nL\u0027\u00e9diteur propose une mesure de contournement si l\u0027installation des\ncorrectifs n\u0027est pas envisageable (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-37852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37852"
    }
  ],
  "initial_release_date": "2022-01-31T00:00:00",
  "last_revision_date": "2022-01-31T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-095",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-01-31T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0\nun attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 ESET du 31 janvier 2022",
      "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows"
    }
  ]
}

CERTFR-2021-AVI-980
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Microsoft Windows Tous les produits F-Secure Endpoint Protection sur Windows et Mac
Microsoft N/A F-Secure Internet Gatekeeper
N/A N/A F-Secure Atlant
ESET Security F-Secure Linux Security 64
ESET Security F-Secure Linux Security (32-bit)
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tous les produits F-Secure Endpoint Protection sur Windows et Mac",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Internet Gatekeeper",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Atlant",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security 64",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security (32-bit)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-40836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40836"
    }
  ],
  "initial_release_date": "2021-12-22T00:00:00",
  "last_revision_date": "2021-12-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-980",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-12-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2021-40836 du 22 d\u00e9cembre 2021",
      "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40836"
    }
  ]
}

CERTFR-2021-AVI-905
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans F-Secure. Elle permet à un attaquant de provoquer un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Microsoft N/A F-Secure Internet Gatekeeper
N/A N/A F-Secure Atlant
ESET Security F-Secure Linux Security 64
Microsoft Windows F-Secure F-Secure Endpoint Protection sur Windows et Mac
ESET Security F-Secure Linux Security (32-bit)
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "F-Secure Internet Gatekeeper",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Atlant",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security 64",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure F-Secure Endpoint Protection sur Windows et Mac",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security (32-bit)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-40833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40833"
    }
  ],
  "initial_release_date": "2021-11-26T00:00:00",
  "last_revision_date": "2021-11-26T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-905",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-11-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans F-Secure. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure du 26 novembre 2021",
      "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833"
    }
  ]
}

CERTFR-2021-AVI-790
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits TrendMicro. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Trend Micro Apex One Apex One SaaS sans la mise à jour mensuelle de septembre 2021
ESET Security Worry-Free Business Security (WFBS) version 10.0SP1 sans le correctif 2342
Trend Micro Apex One Apex One 2019 (On-prem) versions antérieures à CP 9645
ESET Security Worry-Free Business Security Services (WFBSS) versions antérieures à 6.7.1648 ou 14.2.1349
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Apex One SaaS sans la mise \u00e0 jour mensuelle de septembre 2021",
      "product": {
        "name": "Apex One",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Worry-Free Business Security (WFBS) version 10.0SP1 sans le correctif 2342",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Apex One 2019 (On-prem) versions ant\u00e9rieures \u00e0 CP 9645",
      "product": {
        "name": "Apex One",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Worry-Free Business Security Services (WFBSS) versions ant\u00e9rieures \u00e0 6.7.1648 ou 14.2.1349",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-42012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42012"
    },
    {
      "name": "CVE-2021-23139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23139"
    },
    {
      "name": "CVE-2021-42011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42011"
    },
    {
      "name": "CVE-2021-42108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42108"
    },
    {
      "name": "CVE-2021-42104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42104"
    },
    {
      "name": "CVE-2021-42101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42101"
    },
    {
      "name": "CVE-2021-42103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42103"
    }
  ],
  "initial_release_date": "2021-10-15T00:00:00",
  "last_revision_date": "2021-10-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-790",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-10-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nTrendMicro. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits TrendMicro",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000289229 du 14 octobre 2021",
      "url": "https://success.trendmicro.com/solution/000289229"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000289230 du 14 octobre 2021",
      "url": "https://success.trendmicro.com/solution/000289230"
    }
  ]
}

CERTFR-2021-AVI-675
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET N/A F-Secure Cloud Protection for Salesforce sans le correctif Capricorn 2021-08-25_04
Microsoft Windows Tous les équipements de F-Secure sur Windows et Mac sans le correctif Capricorn 2021-08-25_04
ESET N/A F-Secure Atlant sans le correctif Capricorn 2021-08-25_04
ESET Security F-Secure Linux Security sans le correctif Capricorn 2021-08-25_04
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "F-Secure Cloud Protection for Salesforce sans le correctif Capricorn 2021-08-25_04",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Tous les \u00e9quipements de F-Secure sur Windows et Mac sans le correctif Capricorn 2021-08-25_04",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Atlant sans le correctif Capricorn 2021-08-25_04",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security sans le correctif Capricorn 2021-08-25_04",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33599"
    }
  ],
  "initial_release_date": "2021-09-03T00:00:00",
  "last_revision_date": "2021-09-03T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-675",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-03T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2021-33599 du 3 septembre 2021",
      "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33599"
    }
  ]
}

CERTFR-2021-AVI-650
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security F-Secure Linux Security sans le dernier correctif du 2021-08-10_07
Microsoft Windows F-Secure endpoint protection sur Windows et Mac sans le dernier correctif du 2021-08-10_07
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "F-Secure Linux Security sans le dernier correctif du 2021-08-10_07",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure endpoint protection sur Windows et Mac sans le dernier correctif du 2021-08-10_07",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-33598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33598"
    }
  ],
  "initial_release_date": "2021-08-23T00:00:00",
  "last_revision_date": "2021-08-23T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-650",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-08-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure fsc-2021-33598 du 23 ao\u00fbt 2021",
      "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/fsc-2021-33598"
    }
  ]
}

CERTFR-2021-AVI-513
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits TrendMicro. Elle permet à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security Worry-Free Business Security version 10.0 SP1 sans le correctif 2329
Trend Micro Apex One Apex One version 2019 (on-premise) sans le correctif 5 b9565
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Worry-Free Business Security version 10.0 SP1 sans le correctif 2329",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Apex One version 2019 (on-premise) sans le correctif 5 b9565",
      "product": {
        "name": "Apex One",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-32463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32463"
    }
  ],
  "initial_release_date": "2021-07-12T00:00:00",
  "last_revision_date": "2021-07-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-513",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-07-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits TrendMicro. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits TrendMicro",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000286856 du 09 juillet 2021",
      "url": "https://success.trendmicro.com/solution/000286856"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000286855 du 09 juillet 2021",
      "url": "https://success.trendmicro.com/solution/000286855"
    }
  ]
}

CERTFR-2018-AVI-269
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET N/A F-Secure Computer Protection Premium
ESET Server Security F-Secure PSB Server Security
ESET Server Security F-Secure Server Security Premium
ESET Server Security F-Secure PSB Email et Server Security
ESET Server Security F-Secure Email et Server Security
ESET Security F-Secure PSB Workstation Security
ESET Server Security F-Secure Server Security
ESET Security F-Secure Client Security Premium
ESET Security F-Secure Client Security
Microsoft Windows F-Secure SAFE pour Windows
ESET N/A F-Secure Computer Protection
ESET Server Security F-Secure Email et Server Security Premium
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "F-Secure Computer Protection Premium",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure PSB Server Security",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Server Security Premium",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure PSB Email et Server Security",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Email et Server Security",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure PSB Workstation Security",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Server Security",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Client Security Premium",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Client Security",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure SAFE pour Windows",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Computer Protection",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Email et Server Security Premium",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2018-06-06T00:00:00",
  "last_revision_date": "2018-06-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2018-AVI-269",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2018-06-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure FSC-2018-2 du 1 juin 2018",
      "url": "https://www.f-secure.com/en/web/labs_global/fsc-2018-2"
    }
  ]
}

CERTFR-2018-AVI-026
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Juniper Networks Junos OS Junos OS versions 15.1X53 antérieures à 15.1X53-D232 sur QFX5200/5110
Juniper Networks Junos OS Junos OS versions 17.1 antérieures à 17.1R2-S5, 17.1R3 et 17.1R3 sur MX series
Juniper Networks Junos OS Junos OS versions 15.1 antérieures à 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7
Juniper Networks Junos OS Junos OS versions 16.1 antérieures à 16.1R6 sur MX series
Juniper Networks Junos OS Junos OS versions 15.1X53 antérieures à 15.1X53-D70, 15.1X53-D231
Juniper Networks Junos OS Junos OS versions 14.1 antérieures à 14.1R9 sur MX series
Juniper Networks Junos OS Junos OS versions 16.2 antérieures à 16.2R2, 16.2R2-S2, 16.2R3
Juniper Networks Junos OS Junos OS versions 14.2 antérieures à 14.2R8
N/A N/A CTPView versions 7.1, 7.2 et 7.3.
Juniper Networks Junos OS Junos OS versions 15.1 antérieures à 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7, 15.1F6, 15.1R3
Juniper Networks Junos OS Junos OS versions 15.1 antérieures à 15.1R6-S2, 15.1R7
Juniper Networks Junos OS Junos OS versions 16.1 antérieures à 16.1R5-S1, 16.1R6
Juniper Networks Junos Space Junos Space antérieures à 17.2R1
Juniper Networks Junos OS Junos OS versions 15.1 antérieures à 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 sur MX series
Juniper Networks Junos OS Junos OS versions 16.2 antérieures à 16.2R3 sur MX series
Juniper Networks Junos OS Junos OS versions 15.1X49 versions 15.1X49-D100 et supérieures mais antérieures à 15.1X49-D121
Juniper Networks Junos OS Junos OS versions 14.1X53 antérieures à 14.1X53-D40 sur QFX, EX
Juniper Networks Junos OS Junos OS versions 14.2 antérieures à 14.2R8 sur MX series
Juniper Networks Junos OS Junos OS versions 12.1X46 antérieures à 12.1X46-D71
Juniper Networks Junos OS Junos OS versions 15.1X49 antérieures à 15.1X49-D110 sur SRX
N/A N/A ScreenOS toutes versions sans le dernier correctif de sécurité
Juniper Networks Junos OS Junos OS versions 16.1X65 antérieures à 16.1X65-D45
Juniper Networks Junos OS Junos OS versions 14.1 antérieures à 14.1R8-S5, 14.1R9
Juniper Networks Junos OS Junos OS versions 12.3X48 antérieures à 12.3X48-D55 sur SRX
Juniper Networks Junos OS Junos OS versions 15.1R5-S4, 15.1R5-S5 et 15.1R6
Juniper Networks Junos OS Junos OS versions 12.1X46 antérieures à 12.1X46-D71 sur SRX
Juniper Networks Junos OS Junos OS versions 12.3 antérieures à 12.3R12-S7
Juniper Networks Junos OS Junos OS versions 14.1X53 antérieures à 14.1X53-D46, 14.1X53-D50 et 14.1X53-D107
Juniper Networks Junos OS Junos OS versions 12.3R antérieures à 12.3R12-S7
Juniper Networks Junos OS Junos OS versions 12.3X48 antérieures à 12.3X48-D55
Juniper Networks Junos OS Junos OS versions 12.3R12 antérieures à 12.3R12-S7
Juniper Networks Junos OS Junos OS versions 12.3X48 versions 12.3X48-D55 et supérieures mais antérieures à 12.3X48-D65
Juniper Networks Junos OS Junos OS versions 17.2X75 antérieures à 17.2X75-D50
Juniper Networks Junos OS Junos OS versions 15.1X53 antérieures à 15.1X53-D49, 15.1X53-D470 sur NFX
Juniper Networks Junos OS Junos OS versions 15.1X53 antérieures à 15.1X53-D65 sur QFX10K
Juniper Networks Junos OS Junos OS versions 16.1 antérieures à 16.1R3-S6, 16.1R4-S6 et 16.1R5
ESET Security Security Director et Log Collector antérieures à 17.2R1
Juniper Networks Junos OS Junos OS versions 14.2 antérieures à 14.2R7-S9, 14.2R8

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D232 sur QFX5200/5110",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 17.1 ant\u00e9rieures \u00e0 17.1R2-S5, 17.1R3 et 17.1R3 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R6 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D70, 15.1X53-D231",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.1 ant\u00e9rieures \u00e0 14.1R9 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.2 ant\u00e9rieures \u00e0 16.2R2, 16.2R2-S2, 16.2R3",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R8",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "CTPView versions 7.1, 7.2 et 7.3.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7, 15.1F6, 15.1R3",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1R6-S2, 15.1R7",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R5-S1, 16.1R6",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space ant\u00e9rieures \u00e0 17.2R1",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.2 ant\u00e9rieures \u00e0 16.2R3 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1X49 versions 15.1X49-D100 et sup\u00e9rieures mais ant\u00e9rieures \u00e0 15.1X49-D121",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.1X53 ant\u00e9rieures \u00e0 14.1X53-D40 sur QFX, EX",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R8 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.1X46 ant\u00e9rieures \u00e0 12.1X46-D71",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D110 sur SRX",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "ScreenOS toutes versions sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.1X65 ant\u00e9rieures \u00e0 16.1X65-D45",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.1 ant\u00e9rieures \u00e0 14.1R8-S5, 14.1R9",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D55 sur SRX",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1R5-S4, 15.1R5-S5 et 15.1R6",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.1X46 ant\u00e9rieures \u00e0 12.1X46-D71 sur SRX",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3 ant\u00e9rieures \u00e0 12.3R12-S7",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.1X53 ant\u00e9rieures \u00e0 14.1X53-D46, 14.1X53-D50 et 14.1X53-D107",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3R ant\u00e9rieures \u00e0 12.3R12-S7",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D55",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3R12 ant\u00e9rieures \u00e0 12.3R12-S7",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3X48 versions 12.3X48-D55 et sup\u00e9rieures mais ant\u00e9rieures \u00e0 12.3X48-D65",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 17.2X75 ant\u00e9rieures \u00e0 17.2X75-D50",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D49, 15.1X53-D470 sur NFX",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D65 sur QFX10K",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R3-S6, 16.1R4-S6 et 16.1R5",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Security Director et Log Collector ant\u00e9rieures \u00e0 17.2R1",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R7-S9, 14.2R8",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2017-3169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
    },
    {
      "name": "CVE-2017-14106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-14106"
    },
    {
      "name": "CVE-2018-0002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0002"
    },
    {
      "name": "CVE-2015-5600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5600"
    },
    {
      "name": "CVE-2018-0008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0008"
    },
    {
      "name": "CVE-2015-6563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-6563"
    },
    {
      "name": "CVE-2018-0013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0013"
    },
    {
      "name": "CVE-2015-6564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-6564"
    },
    {
      "name": "CVE-2015-7236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7236"
    },
    {
      "name": "CVE-2017-7668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
    },
    {
      "name": "CVE-2017-9798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
    },
    {
      "name": "CVE-2018-0011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0011"
    },
    {
      "name": "CVE-2016-2141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2141"
    },
    {
      "name": "CVE-2015-7501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501"
    },
    {
      "name": "CVE-2015-5304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5304"
    },
    {
      "name": "CVE-2018-0012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0012"
    },
    {
      "name": "CVE-2018-0003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0003"
    },
    {
      "name": "CVE-2017-9788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
    },
    {
      "name": "CVE-2015-5174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5174"
    },
    {
      "name": "CVE-2017-1000112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000112"
    },
    {
      "name": "CVE-2016-8858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8858"
    },
    {
      "name": "CVE-2017-5664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5664"
    },
    {
      "name": "CVE-2017-1000111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000111"
    },
    {
      "name": "CVE-2017-6074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-6074"
    },
    {
      "name": "CVE-2017-5645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5645"
    },
    {
      "name": "CVE-2018-0010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0010"
    },
    {
      "name": "CVE-2018-0005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0005"
    },
    {
      "name": "CVE-2018-0007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0007"
    },
    {
      "name": "CVE-2016-8655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8655"
    },
    {
      "name": "CVE-2017-3167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
    },
    {
      "name": "CVE-2015-5188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5188"
    },
    {
      "name": "CVE-2018-0009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0009"
    },
    {
      "name": "CVE-2017-7679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
    },
    {
      "name": "CVE-2018-0004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0004"
    },
    {
      "name": "CVE-2018-0014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0014"
    },
    {
      "name": "CVE-2017-2634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-2634"
    },
    {
      "name": "CVE-2016-8743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
    },
    {
      "name": "CVE-2015-5220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5220"
    },
    {
      "name": "CVE-2018-0006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0006"
    },
    {
      "name": "CVE-2018-0001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0001"
    }
  ],
  "initial_release_date": "2018-01-11T00:00:00",
  "last_revision_date": "2018-01-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2018-AVI-026",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2018-01-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10838 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10838\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10831 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10831\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10835 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10835\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10833 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10833\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10837 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10837\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10841 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10841\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10828 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10828\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10834 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10834\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10829 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10829\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10836 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10836\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10839 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10839\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10830 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10830\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10832 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10832\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10840 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10840\u0026cat=SIRT_1\u0026actp=LIST"
    }
  ]
}

CERTFR-2016-AVI-277
Vulnerability from certfr_avis

Une vulnérabilité a été corrigée dans Huawei Unified Security Gateway. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security Huawei USG2100, version antérieure à V300R001C10SPC600
ESET Security Huawei USG5100, version antérieure à V300R001C10SPC600
ESET Security Huawei USG2200, version antérieure à V300R001C10SPC600
ESET Security Huawei USG5500, version antérieure à V300R001C10SPC600

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Huawei USG2100, version ant\u00e9rieure \u00e0 V300R001C10SPC600",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Huawei USG5100, version ant\u00e9rieure \u00e0 V300R001C10SPC600",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Huawei USG2200, version ant\u00e9rieure \u00e0 V300R001C10SPC600",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Huawei USG5500, version ant\u00e9rieure \u00e0 V300R001C10SPC600",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2016-08-11T00:00:00",
  "last_revision_date": "2016-08-11T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Huawei huawei-sa-20160810-01-usg du 10    ao\u00fbt 2016",
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en"
    }
  ],
  "reference": "CERTFR-2016-AVI-277",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2016-08-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eHuawei\nUnified Security Gateway\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Huawei Unified Security Gateway",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Huawei huawei-sa-20160810-01-usg du 10 ao\u00fbt 2016",
      "url": null
    }
  ]
}

CERTFR-2015-AVI-286
Vulnerability from certfr_avis

De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.

Contournement provisoire

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security SRX Network Security Daemon
N/A N/A Junos OS avec J-Web activé
Juniper Networks Junos OS Junos OS 12.1X46-D15 et versions ultérieures
N/A N/A CTPView version 7.1R1

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SRX Network Security Daemon",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS avec J-Web activ\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS 12.1X46-D15 et versions ult\u00e9rieures",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "CTPView version 7.1R1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Contournement provisoire\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2015-3007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-3007"
    },
    {
      "name": "CVE-2015-5362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5362"
    },
    {
      "name": "CVE-2014-0226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0226"
    },
    {
      "name": "CVE-2015-3456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-3456"
    },
    {
      "name": "CVE-2015-5358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5358"
    },
    {
      "name": "CVE-2014-6447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-6447"
    },
    {
      "name": "CVE-2015-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5363"
    },
    {
      "name": "CVE-2015-5357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5357"
    },
    {
      "name": "CVE-2015-5359",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5359"
    },
    {
      "name": "CVE-2015-5360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5360"
    }
  ],
  "initial_release_date": "2015-07-09T00:00:00",
  "last_revision_date": "2015-07-09T00:00:00",
  "links": [
    {
      "title": "R\u00e9f\u00e9rence CVE CVE-2015-3456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-3456"
    },
    {
      "title": "R\u00e9f\u00e9rence CVE CVE-2015-3007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-3007"
    },
    {
      "title": "R\u00e9f\u00e9rence CVE CVE-2014-6447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-6447"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10684\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10692\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "title": "R\u00e9f\u00e9rence CVE CVE-2015-5359",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5359"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015",
      "url": "http://http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10682\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10693\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015      http://",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10682\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10688\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "title": "R\u00e9f\u00e9rence CVE CVE-2015-5360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5360"
    },
    {
      "title": "R\u00e9f\u00e9rence CVE CVE-2015-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5363"
    },
    {
      "title": "R\u00e9f\u00e9rence CVE CVE-2015-5358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5358"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10690\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "title": "R\u00e9f\u00e9rence CVE CVE-2015-5362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5362"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10691\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "title": "R\u00e9f\u00e9rence CVE CVE-2014-0226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0226"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10687\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "title": "R\u00e9f\u00e9rence CVE CVE-2015-5357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5357"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10686\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10685\u0026cat=SIRT_1\u0026actp=LIST"
    }
  ],
  "reference": "CERTFR-2015-AVI-286",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2015-07-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Juniper\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": []
}

CERTFR-2014-AVI-480
Vulnerability from certfr_avis

De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Juniper Networks N/A CTPOS versions antérieures à 6.6R2
ESET Security Juniper Security Threat Response Manager versions 2012.1, 2013.1, 2013.2
Juniper Networks N/A CTPView versions 4.2, 4.3, 4.4, 4.5, 4.6
Juniper Networks Junos Space Junos Space jusqu'à la version 13.3
Juniper Networks Secure Analytics Juniper Secure Analytics versions 2013.2, 2014.1, 2014.2
ESET Security Network and Security Manager (NSM) version 2012.2

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "CTPOS versions ant\u00e9rieures \u00e0 6.6R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Juniper Security Threat Response Manager versions 2012.1, 2013.1, 2013.2",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "CTPView versions 4.2, 4.3, 4.4, 4.5, 4.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space jusqu\u0027\u00e0 la version 13.3",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Juniper Secure Analytics versions 2013.2, 2014.1, 2014.2",
      "product": {
        "name": "Secure Analytics",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Network and Security Manager (NSM) version 2012.2",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2012-3158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3158"
    },
    {
      "name": "CVE-2010-3853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3853"
    },
    {
      "name": "CVE-2014-0075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0075"
    },
    {
      "name": "CVE-2010-3081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081"
    },
    {
      "name": "CVE-2012-0789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0789"
    },
    {
      "name": "CVE-2012-2329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2329"
    },
    {
      "name": "CVE-2014-0460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0460"
    },
    {
      "name": "CVE-2011-4609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-4609"
    },
    {
      "name": "CVE-2011-0421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
    },
    {
      "name": "CVE-2012-0781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0781"
    },
    {
      "name": "CVE-2014-4827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-4827"
    },
    {
      "name": "CVE-2013-1635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-1635"
    },
    {
      "name": "CVE-2011-0216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
    },
    {
      "name": "CVE-2013-1620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-1620"
    },
    {
      "name": "CVE-2014-0119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0119"
    },
    {
      "name": "CVE-2012-2110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
    },
    {
      "name": "CVE-2014-7186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186"
    },
    {
      "name": "CVE-2009-2416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
    },
    {
      "name": "CVE-2012-0788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0788"
    },
    {
      "name": "CVE-2010-4755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4755"
    },
    {
      "name": "CVE-2013-1775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-1775"
    },
    {
      "name": "CVE-2009-5029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-5029"
    },
    {
      "name": "CVE-2011-1153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1153"
    },
    {
      "name": "CVE-2009-3563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3563"
    },
    {
      "name": "CVE-2014-0411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0411"
    },
    {
      "name": "CVE-2013-1643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-1643"
    },
    {
      "name": "CVE-2013-0791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0791"
    },
    {
      "name": "CVE-2010-1646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1646"
    },
    {
      "name": "CVE-2014-7169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
    },
    {
      "name": "CVE-2011-1944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
    },
    {
      "name": "CVE-2014-0099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0099"
    },
    {
      "name": "CVE-2011-0010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0010"
    },
    {
      "name": "CVE-2011-1398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1398"
    },
    {
      "name": "CVE-2011-2834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
    },
    {
      "name": "CVE-2014-4825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-4825"
    },
    {
      "name": "CVE-2010-4707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4707"
    },
    {
      "name": "CVE-2012-0882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0882"
    },
    {
      "name": "CVE-2009-0159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
    },
    {
      "name": "CVE-2014-0453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0453"
    },
    {
      "name": "CVE-2011-0708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
    },
    {
      "name": "CVE-2014-6271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
    },
    {
      "name": "CVE-2014-6277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-6277"
    },
    {
      "name": "CVE-2014-1568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
    },
    {
      "name": "CVE-2010-0830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0830"
    },
    {
      "name": "CVE-2010-0426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0426"
    },
    {
      "name": "CVE-2014-0423",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
    },
    {
      "name": "CVE-2012-2311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2311"
    },
    {
      "name": "CVE-2014-0224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224"
    },
    {
      "name": "CVE-2014-4830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-4830"
    },
    {
      "name": "CVE-2011-3368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
    },
    {
      "name": "CVE-2014-2532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-2532"
    },
    {
      "name": "CVE-2014-4828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-4828"
    },
    {
      "name": "CVE-2014-0095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0095"
    },
    {
      "name": "CVE-2010-0427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0427"
    },
    {
      "name": "CVE-2014-3470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3470"
    },
    {
      "name": "CVE-2014-3062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3062"
    },
    {
      "name": "CVE-2012-0831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0831"
    },
    {
      "name": "CVE-2009-2414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
    },
    {
      "name": "CVE-2012-0057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0057"
    },
    {
      "name": "CVE-2014-7187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187"
    },
    {
      "name": "CVE-2010-2956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2956"
    },
    {
      "name": "CVE-2011-3905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
    },
    {
      "name": "CVE-2014-4833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-4833"
    },
    {
      "name": "CVE-2011-4566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-4566"
    },
    {
      "name": "CVE-2014-0837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0837"
    },
    {
      "name": "CVE-2010-4008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
    },
    {
      "name": "CVE-2014-6278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-6278"
    },
    {
      "name": "CVE-2012-1172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1172"
    },
    {
      "name": "CVE-2014-0076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0076"
    },
    {
      "name": "CVE-2010-1163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1163"
    },
    {
      "name": "CVE-2011-4317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
    },
    {
      "name": "CVE-2011-4885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
    },
    {
      "name": "CVE-2010-5107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-5107"
    },
    {
      "name": "CVE-2009-1265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1265"
    },
    {
      "name": "CVE-2010-3316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3316"
    },
    {
      "name": "CVE-2012-3510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3510"
    },
    {
      "name": "CVE-2011-5000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-5000"
    },
    {
      "name": "CVE-2010-3435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3435"
    },
    {
      "name": "CVE-2011-3919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
    },
    {
      "name": "CVE-2012-2337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2337"
    },
    {
      "name": "CVE-2011-1089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1089"
    },
    {
      "name": "CVE-2014-0096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0096"
    },
    {
      "name": "CVE-2013-5908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-5908"
    },
    {
      "name": "CVE-2014-3091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3091"
    },
    {
      "name": "CVE-2012-2131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2131"
    }
  ],
  "initial_release_date": "2014-11-13T00:00:00",
  "last_revision_date": "2014-11-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2014-AVI-480",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2014-11-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une\nex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10661 du 11 novembre 2014",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10661"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10657 du 11 novembre 2014",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10657"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10658 du 11 novembre 2014",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10658"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10659 du 11 novembre 2014",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10659"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10660 du 11 novembre 2014",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10660"
    }
  ]
}

CERTFR-2014-AVI-357
Vulnerability from certfr_avis

De multiples vulnérabilités ont été corrigées dans les produits Juniper. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
N/A N/A NSM3000
ESET Security Security Threat Response Manager
Juniper Networks Secure Analytics Juniper Secure Analytics
N/A N/A NSMExpress
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "NSM3000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Security Threat Response Manager",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Juniper Secure Analytics",
      "product": {
        "name": "Secure Analytics",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "NSMExpress",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2012-0053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0053"
    },
    {
      "name": "CVE-2011-3192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
    },
    {
      "name": "CVE-2014-0460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0460"
    },
    {
      "name": "CVE-2014-0063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0063"
    },
    {
      "name": "CVE-2013-4286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4286"
    },
    {
      "name": "CVE-2013-4002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4002"
    },
    {
      "name": "CVE-2013-5823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-5823"
    },
    {
      "name": "CVE-2013-4590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4590"
    },
    {
      "name": "CVE-2012-5081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-5081"
    },
    {
      "name": "CVE-2014-0061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0061"
    },
    {
      "name": "CVE-2013-2457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-2457"
    },
    {
      "name": "CVE-2013-5803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-5803"
    },
    {
      "name": "CVE-2012-0031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0031"
    },
    {
      "name": "CVE-2014-0114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0114"
    },
    {
      "name": "CVE-2014-0067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0067"
    },
    {
      "name": "CVE-2014-0411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0411"
    },
    {
      "name": "CVE-2013-2461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-2461"
    },
    {
      "name": "CVE-2013-0443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443"
    },
    {
      "name": "CVE-2014-0098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0098"
    },
    {
      "name": "CVE-2014-0453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0453"
    },
    {
      "name": "CVE-2013-0169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
    },
    {
      "name": "CVE-2013-5802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-5802"
    },
    {
      "name": "CVE-2014-0423",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
    },
    {
      "name": "CVE-2014-0224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224"
    },
    {
      "name": "CVE-2013-0440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440"
    },
    {
      "name": "CVE-2011-3368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
    },
    {
      "name": "CVE-2013-4322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4322"
    },
    {
      "name": "CVE-2013-5780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-5780"
    },
    {
      "name": "CVE-2014-0064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0064"
    },
    {
      "name": "CVE-2014-0065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0065"
    },
    {
      "name": "CVE-2013-2451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-2451"
    },
    {
      "name": "CVE-2014-0107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0107"
    },
    {
      "name": "CVE-2013-2407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-2407"
    },
    {
      "name": "CVE-2014-0033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0033"
    },
    {
      "name": "CVE-2014-0062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0062"
    },
    {
      "name": "CVE-2014-0060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0060"
    },
    {
      "name": "CVE-2010-5298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-5298"
    },
    {
      "name": "CVE-2013-5825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-5825"
    },
    {
      "name": "CVE-2013-1537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-1537"
    },
    {
      "name": "CVE-2014-0198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0198"
    },
    {
      "name": "CVE-2011-0419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
    },
    {
      "name": "CVE-2013-5830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-5830"
    },
    {
      "name": "CVE-2014-0066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0066"
    }
  ],
  "initial_release_date": "2014-08-14T00:00:00",
  "last_revision_date": "2014-08-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2014-AVI-357",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2014-08-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10642 du 13 ao\u00fbt 2014",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10642"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10643 du 13 ao\u00fbt 2014",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10643"
    }
  ]
}