Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

TrustKeeper Scan Engine Update for July 02, 2020

Summary

The latest update to the TrustKeeper scan engine that powers our Trustwave Vulnerability Management product (including both internal and external vulnerability scanning) is now available. Enjoy!


New Vulnerability Test Highlights

Some of the more interesting vulnerability tests we added recently are as follows:

Magento

  • Added check for Magento 1.x End Of Life

Cisco

  • Cisco ASA ARP Denial of Service Vulnerability (cisco-sa-fp2100-arp-dos-kLdCK8ks) (CVE-2020-3334)
  • Cisco IOS Common Industrial Protocol Denial of Service Vulnerabilities (cisco-sa-cipdos-hkfTZXEx, CSCvo17827, CSCvp56319, CSCvr47365 and CSCvr67776) (CVE-2020-3225)
  • Cisco IOS for Catalyst 2960-L Series Switches and Catalyst CDB-8P Switches 802.1X Authentication Bypass Vulnerability (cisco-sa-c2960L-DpWA9Re4 and CSCvo57950) (CVE-2020-3231)
  • Cisco IOS for Cisco 800 Series Industrial Integrated Services Routers Image Verification Bypass Vulnerability (cisco-sa-ios-ir800-img-verif-wHhLYHjK and CSCvq27907) (CVE-2020-3208)
  • Cisco IOS for Cisco Industrial Routers Arbitrary Code Execution Vulnerabilities (cisco-sa-ios-iot-rce-xYRSeMNH and CSCvr12083) (CVE-2020-3198, CVE-2020-3258)
  • Cisco IOS for Cisco Industrial Routers Virtual Device Server CLI Command Injection Vulnerability (cisco-sa-ios-iot-vds-cmd-inj-VfJtqGhE, CSCvq87451 and CSCvr18056) (CVE-2020-3210)
  • Cisco IOS for Cisco Industrial Routers Virtual Device Server Inter-VM Channel Command Injection Vulnerability (cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt and CSCvq66443) (CVE-2020-3205)
  • Cisco IOS for Cisco Industrial Routers Virtual Device Server Static Credentials Vulnerability (cisco-sa-ios-iot-vds-cred-uPMp9zbY and CSCvo56332) (CVE-2020-3234)
  • Cisco IOS Internet Key Exchange Version 2 Denial of Service Vulnerability (cisco-sa-ikev2-9p23Jj2a and CSCvp44397) (CVE-2020-3230)
  • Cisco IOS Secure Shell Denial of Service Vulnerability (cisco-sa-ssh-dos-Un22sd2A and CSCvp79333) (CVE-2020-3200)
  • Cisco IOS Session Initiation Protocol Denial of Service Vulnerability (cisco-sa-sip-Cv28sQw2 and CSCvq26057) (CVE-2020-3226)
  • Cisco IOS Simple Network Management Protocol Denial of Service Vulnerability (cisco-sa-snmp-dos-USxSyTk5 and CSCvk71355) (CVE-2020-3235)
  • Cisco IOS Software One Platform Kit Remote Code Execution Vulnerability (cisco-sa-ios-nxos-onepk-rce-6Hhyt4dC, CSCvh10810, CSCvs42159, CSCvs42176, CSCvr80243 and CSCvs81070) (CVE-2020-3217)
  • Cisco IOS Software Security Group Tag Exchange Protocol Denial of Service Vulnerability (cisco-sa-sxp-68TEVzR and CSCvp96954) (CVE-2020-3228)
  • Cisco IOS Tcl Arbitrary Code Execution Vulnerability (cisco-sa-tcl-ace-C9KuVKmm and CSCvq05584) (CVE-2020-3204)
  • Cisco IOS Tcl Denial of Service Vulnerability (cisco-sa-tcl-dos-MAZQUnMF and CSCvq28110) (CVE-2020-3201)
  • Cisco IOx Application Environment for IOS Software for Cisco Industrial Routers Vulnerabilities (cisco-sa-ios-iot-gos-vuln-s9qS8kYL and CSCvq68872) (CVE-2020-3199, CVE-2020-3257)

Drupal

  • Drupal Core Form API Cross-Site Request Forgery (SA-CORE-2020-004) (CVE-2020-13663)
  • Drupal Core JSON API Access Bypass Vulnerability (SA-CORE-2020-006) (CVE-2020-13665)

Pulse Connect Secure

  • Pulse Connect Secure Admin UI Cross-Site Scripting Vulnerability (SA40211) (CVE-2016-4790)
  • Pulse Connect Secure Admin UI Information Disclosure Vulnerability (SA40210) (CVE-2016-4791)
  • Pulse Connect Secure CPU Denial of Service (SA40206) (CVE-2016-4786)
  • Pulse Connect Secure diag.cgi Cross-Site Request Forgery Vulnerability (SA40793) (CVE-2017-11455)
  • Pulse Connect Secure Remote Desktop Protocol Restriction Bypass (SA40166) (CVE-2016-3985)
  • Pulse Connect Secure Sign-in Page Disclosure (SA40212) (CVE-2016-4792)
  • Pulse Connect Secure System Authentication File Content Disclosure (SA40207) (CVE-2016-4787)
  • Pulse Connect Secure System Configuration Cross-Site Scripting Vulnerability (SA40209) (CVE-2016-4789)
  • Pulse Connect Secure System File Content Disclosure (SA40208) (CVE-2016-4788)

Red Hat Enterprise Linux (Credentialed Checks)

Squid

  • Squid Proxy TLS Handshake Denial of Service (SQUID-2020:6) (CVE-2020-14058)

CRIME attack - CVE-2012-4929 (Active Check)

Ubuntu (Credentialed Checks)

FreeBSD

  • FreeBSD USB HID Parsing Error Vulnerability (FreeBSD-SA-20:17.usb) (CVE-2020-7456)

ISC

  • ISC BIND rbtdb.c Assertion Failure Denial Of Service Vulnerability (CVE-2020-8619)
  • ISC BIND rdataset.c Denial of Service (CVE-2020-8618)

NTP

  • NTP ntpd transit timestamp ipv4 Denial Of Service Vulnerability (CVE-2020-13817)

PHP

  • Drupal Core Arbitrary PHP Code Execution (SA-CORE-2020-005) (CVE-2020-13664)

WordPress

  • WordPress Block Editor wp-admin Authenticated Cross-Site Scripting (CVE-2020-4046)
  • WordPress Media Files Authenticated Cross-Site Scripting (CVE-2020-4047)
  • WordPress Password-Protected Post Comments Disclosure Vulnerability
  • WordPress set-screen-option Privilege Escalation Vulnerability (CVE-2020-4050)
  • WordPress Theme Upload Authenticated Cross-Site Scripting (CVE-2020-4049)
  • WordPress wp_validate_redirect Open Redirection Vulnerability (CVE-2020-4048)

How to Update?

All Trustwave customers using the TrustKeeper Scan Engine receive the updates automatically as soon as an update is available. No action is required.

Latest Software Updates

DbProtect 6.6.12 and AppDetectivePRO 10.10 Now Available

Announcing DbProtect Suite Release 6.6.12 For any additional information, navigate to the Database Security folder in the File Cabinet of the Support section in the Trustwave Fusion platform.

Read More

DbProtect Suite release 6.6.11 Now Available

Announcing DbProtect Suite Release 6.6.11 We're excited to announce that with this release, we have implemented several security updates and additional checks to enhance the overall protection of...

Read More

Fare Thee Well ModSecurity: End-of-Life and Last Commercial Rules Update for June 2024

A Fourteen Year Journey Comes to an End.

Read More