Summary
The latest update to the TrustKeeper scan engine that powers our Trustwave Vulnerability Management product (including both internal and external vulnerability scanning) is now available. Enjoy!
New Vulnerability Test Highlights
Some of the more interesting vulnerability tests we added recently are as follows:
Magento
- Added check for Magento 1.x End Of Life
Cisco
- Cisco ASA ARP Denial of Service Vulnerability (cisco-sa-fp2100-arp-dos-kLdCK8ks) (CVE-2020-3334)
- Cisco IOS Common Industrial Protocol Denial of Service Vulnerabilities (cisco-sa-cipdos-hkfTZXEx, CSCvo17827, CSCvp56319, CSCvr47365 and CSCvr67776) (CVE-2020-3225)
- Cisco IOS for Catalyst 2960-L Series Switches and Catalyst CDB-8P Switches 802.1X Authentication Bypass Vulnerability (cisco-sa-c2960L-DpWA9Re4 and CSCvo57950) (CVE-2020-3231)
- Cisco IOS for Cisco 800 Series Industrial Integrated Services Routers Image Verification Bypass Vulnerability (cisco-sa-ios-ir800-img-verif-wHhLYHjK and CSCvq27907) (CVE-2020-3208)
- Cisco IOS for Cisco Industrial Routers Arbitrary Code Execution Vulnerabilities (cisco-sa-ios-iot-rce-xYRSeMNH and CSCvr12083) (CVE-2020-3198, CVE-2020-3258)
- Cisco IOS for Cisco Industrial Routers Virtual Device Server CLI Command Injection Vulnerability (cisco-sa-ios-iot-vds-cmd-inj-VfJtqGhE, CSCvq87451 and CSCvr18056) (CVE-2020-3210)
- Cisco IOS for Cisco Industrial Routers Virtual Device Server Inter-VM Channel Command Injection Vulnerability (cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt and CSCvq66443) (CVE-2020-3205)
- Cisco IOS for Cisco Industrial Routers Virtual Device Server Static Credentials Vulnerability (cisco-sa-ios-iot-vds-cred-uPMp9zbY and CSCvo56332) (CVE-2020-3234)
- Cisco IOS Internet Key Exchange Version 2 Denial of Service Vulnerability (cisco-sa-ikev2-9p23Jj2a and CSCvp44397) (CVE-2020-3230)
- Cisco IOS Secure Shell Denial of Service Vulnerability (cisco-sa-ssh-dos-Un22sd2A and CSCvp79333) (CVE-2020-3200)
- Cisco IOS Session Initiation Protocol Denial of Service Vulnerability (cisco-sa-sip-Cv28sQw2 and CSCvq26057) (CVE-2020-3226)
- Cisco IOS Simple Network Management Protocol Denial of Service Vulnerability (cisco-sa-snmp-dos-USxSyTk5 and CSCvk71355) (CVE-2020-3235)
- Cisco IOS Software One Platform Kit Remote Code Execution Vulnerability (cisco-sa-ios-nxos-onepk-rce-6Hhyt4dC, CSCvh10810, CSCvs42159, CSCvs42176, CSCvr80243 and CSCvs81070) (CVE-2020-3217)
- Cisco IOS Software Security Group Tag Exchange Protocol Denial of Service Vulnerability (cisco-sa-sxp-68TEVzR and CSCvp96954) (CVE-2020-3228)
- Cisco IOS Tcl Arbitrary Code Execution Vulnerability (cisco-sa-tcl-ace-C9KuVKmm and CSCvq05584) (CVE-2020-3204)
- Cisco IOS Tcl Denial of Service Vulnerability (cisco-sa-tcl-dos-MAZQUnMF and CSCvq28110) (CVE-2020-3201)
- Cisco IOx Application Environment for IOS Software for Cisco Industrial Routers Vulnerabilities (cisco-sa-ios-iot-gos-vuln-s9qS8kYL and CSCvq68872) (CVE-2020-3199, CVE-2020-3257)
Drupal
- Drupal Core Form API Cross-Site Request Forgery (SA-CORE-2020-004) (CVE-2020-13663)
- Drupal Core JSON API Access Bypass Vulnerability (SA-CORE-2020-006) (CVE-2020-13665)
Pulse Connect Secure
- Pulse Connect Secure Admin UI Cross-Site Scripting Vulnerability (SA40211) (CVE-2016-4790)
- Pulse Connect Secure Admin UI Information Disclosure Vulnerability (SA40210) (CVE-2016-4791)
- Pulse Connect Secure CPU Denial of Service (SA40206) (CVE-2016-4786)
- Pulse Connect Secure diag.cgi Cross-Site Request Forgery Vulnerability (SA40793) (CVE-2017-11455)
- Pulse Connect Secure Remote Desktop Protocol Restriction Bypass (SA40166) (CVE-2016-3985)
- Pulse Connect Secure Sign-in Page Disclosure (SA40212) (CVE-2016-4792)
- Pulse Connect Secure System Authentication File Content Disclosure (SA40207) (CVE-2016-4787)
- Pulse Connect Secure System Configuration Cross-Site Scripting Vulnerability (SA40209) (CVE-2016-4789)
- Pulse Connect Secure System File Content Disclosure (SA40208) (CVE-2016-4788)
Red Hat Enterprise Linux (Credentialed Checks)
- Red Hat Enterprise Linux .NET Core 3.1 on Red Hat Enterprise Linux 8 security update (RHSA-2020:2450) (CVE-2020-1108)
- Red Hat Enterprise Linux .NET Core on Red Hat Enterprise Linux 8 security update (RHSA-2020:2471) (CVE-2020-1108)
- Red Hat Enterprise Linux chromium-browser security update (RHSA-2020:2544) (CVE-2020-6465, CVE-2020-6466, CVE-2020-6467, CVE-2020-6468, CVE-2020-6469, CVE-2020-6470, CVE-2020-6471, CVE-2020-6472, CVE-2020-6473, CVE-2020-6474, CVE-2020-6475, CVE-2020-6476, CVE-2020-6478, CVE-2020-6479, CVE-2020-6480, CVE-2020-6481, CVE-2020-6482, CVE-2020-6483, CVE-2020-6484, CVE-2020-6485, CVE-2020-6486, CVE-2020-6487, CVE-2020-6488, CVE-2020-6489, CVE-2020-6490, CVE-2020-6491, CVE-2020-6493, CVE-2020-6494, CVE-2020-6495, CVE-2020-6496)
- Red Hat Enterprise Linux chromium-browser security update (RHSA-2020:2643) (CVE-2020-6505, CVE-2020-6506, CVE-2020-6507)
- Red Hat Enterprise Linux flash-plugin security update (RHSA-2020:2547) (CVE-2020-9633)
- Red Hat Enterprise Linux gnutls security update (RHSA-2020:2637) (CVE-2020-13777)
- Red Hat Enterprise Linux grafana security update (RHSA-2020:2641) (CVE-2020-13379)
- Red Hat Enterprise Linux kernel security and bug fix update (RHSA-2020:2427) (CVE-2020-12657)
- Red Hat Enterprise Linux kernel security and bug fix update (RHSA-2020:2430) (CVE-2017-12192)
- Red Hat Enterprise Linux kpatch-patch security update (RHSA-2020:2567) (CVE-2020-12657)
- Red Hat Enterprise Linux libexif security update (RHSA-2020:2516) (CVE-2020-13112)
- Red Hat Enterprise Linux libexif security update (RHSA-2020:2549) (CVE-2020-13112)
- Red Hat Enterprise Linux libexif security update (RHSA-2020:2550) (CVE-2020-13112)
- Red Hat Enterprise Linux microcode_ctl security, bug fix and enhancement update (RHSA-2020:2431) (CVE-2020-0543, CVE-2020-0548, CVE-2020-0549)
- Red Hat Enterprise Linux microcode_ctl security, bug fix and enhancement update (RHSA-2020:2432) (CVE-2020-0543, CVE-2020-0548, CVE-2020-0549)
- Red Hat Enterprise Linux microcode_ctl security, bug fix and enhancement update (RHSA-2020:2433) (CVE-2020-0543, CVE-2020-0548, CVE-2020-0549)
- Red Hat Enterprise Linux thunderbird security update (RHSA-2020:2613) (CVE-2020-12398, CVE-2020-12405, CVE-2020-12406, CVE-2020-12410)
- Red Hat Enterprise Linux thunderbird security update (RHSA-2020:2614) (CVE-2020-12398, CVE-2020-12405, CVE-2020-12406, CVE-2020-12410)
- Red Hat Enterprise Linux thunderbird security update (RHSA-2020:2615) (CVE-2020-12398, CVE-2020-12405, CVE-2020-12406, CVE-2020-12410)
- Red Hat Enterprise Linux tomcat security update (RHSA-2020:2530)
- Red Hat Enterprise Linux tomcat6 security update (RHSA-2020:2529) (CVE-2020-9484)
- Red Hat Enterprise Linux unbound security update (RHSA-2020:2414) (CVE-2020-12662, CVE-2020-12663)
- Red Hat Enterprise Linux unbound security update (RHSA-2020:2416) (CVE-2020-12662, CVE-2020-12663)
- Red Hat Enterprise Linux unbound security update (RHSA-2020:2640) (CVE-2020-12662, CVE-2020-12663)
- Red Hat Enterprise Linux unbound security update (RHSA-2020:2642) (CVE-2020-10772)
Squid
- Squid Proxy TLS Handshake Denial of Service (SQUID-2020:6) (CVE-2020-14058)
CRIME attack - CVE-2012-4929 (Active Check)
Ubuntu (Credentialed Checks)
- Ubuntu Bind vulnerabilities (USN-4399-1) (CVE-2020-8618, CVE-2020-8619)
- Ubuntu DBus vulnerability (USN-4398-1) (CVE-2020-12049)
- Ubuntu fwupd vulnerability (USN-4395-1) (CVE-2020-10759)
- Ubuntu GnuTLS vulnerability (USN-4384-1) (CVE-2020-13777)
- Ubuntu Intel Microcode regression (USN-4385-2) (CVE-2020-0543, CVE-2020-0548, CVE-2020-0549)
- Ubuntu Intel Microcode vulnerabilities (USN-4385-1) (CVE-2020-0543, CVE-2020-0548, CVE-2020-0549)
- Ubuntu libexif vulnerabilities (USN-4396-1) (CVE-2020-0093, CVE-2020-0182, CVE-2020-0198, CVE-2020-13112, CVE-2020-13113, CVE-2020-13114)
- Ubuntu libjpeg-turbo vulnerability (USN-4386-1) (CVE-2020-13790)
- Ubuntu Linux kernel vulnerabilities (USN-4387-1) (CVE-2020-0067, CVE-2020-0543, CVE-2020-12114, CVE-2020-12464, CVE-2020-12659)
- Ubuntu Linux kernel vulnerabilities (USN-4388-1) (CVE-2020-0067, CVE-2020-0543, CVE-2020-12114, CVE-2020-12464, CVE-2020-12659, CVE-2020-1749)
- Ubuntu Linux kernel vulnerabilities (USN-4389-1) (CVE-2020-0067, CVE-2020-0543, CVE-2020-10751, CVE-2020-12114, CVE-2020-12464, CVE-2020-12659)
- Ubuntu Linux kernel vulnerabilities (USN-4390-1) (CVE-2020-0067, CVE-2020-0543, CVE-2020-10751, CVE-2020-12114, CVE-2020-12464, CVE-2020-1749)
- Ubuntu Linux kernel vulnerabilities (USN-4391-1) (CVE-2019-19319, CVE-2020-0543, CVE-2020-10751, CVE-2020-12114, CVE-2020-12464, CVE-2020-12769, CVE-2020-12826, CVE-2020-1749)
- Ubuntu NSS vulnerabilities (USN-4397-1) (CVE-2019-17023, CVE-2020-12399)
- Ubuntu SQLite vulnerabilities (USN-4394-1) (CVE-2018-8740, CVE-2019-19603, CVE-2019-19645, CVE-2020-11655, CVE-2020-13434, CVE-2020-13435, CVE-2020-13630, CVE-2020-13631, CVE-2020-13632)
FreeBSD
- FreeBSD USB HID Parsing Error Vulnerability (FreeBSD-SA-20:17.usb) (CVE-2020-7456)
ISC
- ISC BIND rbtdb.c Assertion Failure Denial Of Service Vulnerability (CVE-2020-8619)
- ISC BIND rdataset.c Denial of Service (CVE-2020-8618)
NTP
- NTP ntpd transit timestamp ipv4 Denial Of Service Vulnerability (CVE-2020-13817)
PHP
- Drupal Core Arbitrary PHP Code Execution (SA-CORE-2020-005) (CVE-2020-13664)
WordPress
- WordPress Block Editor wp-admin Authenticated Cross-Site Scripting (CVE-2020-4046)
- WordPress Media Files Authenticated Cross-Site Scripting (CVE-2020-4047)
- WordPress Password-Protected Post Comments Disclosure Vulnerability
- WordPress set-screen-option Privilege Escalation Vulnerability (CVE-2020-4050)
- WordPress Theme Upload Authenticated Cross-Site Scripting (CVE-2020-4049)
- WordPress wp_validate_redirect Open Redirection Vulnerability (CVE-2020-4048)
How to Update?
All Trustwave customers using the TrustKeeper Scan Engine receive the updates automatically as soon as an update is available. No action is required.