{"vulnerability": "cve-2023-2157", "sightings": [{"uuid": "6cdf1aa8-8976-488e-b170-d09a12d16f1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2157", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/597", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-2157\n\ud83d\udd39 Description: A heap-based buffer overflow vulnerability was found in the ImageMagick package that can lead to the application crashing.\n\ud83d\udccf Published: 2023-06-06T00:00:00\n\ud83d\udccf Modified: 2025-01-07T21:31:18.253Z\n\ud83d\udd17 References:\n1. https://bugzilla.redhat.com/show_bug.cgi?id=2208537\n2. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45DUUXYMAEEAW55GSLAXN25VPKCRAIDA/", "creation_timestamp": "2025-01-07T22:41:50.000000Z"}, {"uuid": "a99be00a-bacc-449c-af56-220cdd2959a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21574", "type": "seen", "source": "https://t.me/cibsecurity/58496", "content": "\u203c CVE-2023-21574 \u203c\n\nPhotoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-18T00:13:54.000000Z"}, {"uuid": "6c8a2bf9-15a0-4845-aa07-46384e112053", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21575", "type": "seen", "source": "https://t.me/cibsecurity/58478", "content": "\u203c CVE-2023-21575 \u203c\n\nPhotoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-18T00:13:29.000000Z"}, {"uuid": "a80f1594-9317-48d5-8caf-1b20a048035c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21570", "type": "seen", "source": "https://t.me/cibsecurity/58141", "content": "\u203c CVE-2023-21570 \u203c\n\nMicrosoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-14T22:35:47.000000Z"}, {"uuid": "0ed74013-f6e1-4838-8f0a-89e8ab1afdc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21579", "type": "seen", "source": "https://t.me/cibsecurity/56699", "content": "\u203c CVE-2023-21579 \u203c\n\nAdobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-18T22:21:31.000000Z"}, {"uuid": "cc98234b-c5dc-42a2-9784-99ea00686473", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21574", "type": "seen", "source": "https://t.me/kasperskyb2b/464", "content": "\u0414\u0430\u0439\u0434\u0436\u0435\u0441\u0442 \u043d\u043e\u0432\u043e\u0441\u0442\u0435\u0439 \u043f\u0430\u0442\u0447\u0435\u0439  \ud83e\ude79\ud83e\ude79\ud83e\ude79\u0437\u0430 \u044d\u0442\u0443 \u043d\u0435\u0434\u0435\u043b\u044e:\n\n\u0422\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e, \u00ab\u043d\u0430 \u0445\u0432\u043e\u0441\u0442\u00bb Microsoft \u0441 \u0435\u0451 \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u0435\u0439 Patch Tuesday \u00ab\u0443\u043f\u0430\u043b\u0438\u00bb \u043c\u043d\u043e\u0433\u0438\u0435 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0438, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0418\u0411 \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0441\u0432\u044f\u0442\u0438\u0442\u044c \u043f\u0430\u0442\u0447\u0430\u043c \u043f\u043e\u0447\u0442\u0438 \u0446\u0435\u043b\u0438\u043a\u043e\u043c:\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Windows, Office \u0438 \u043f\u0440\u043e\u0447\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Microsoft \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u043f\u043e\u0447\u0442\u0438 80 \u0437\u0430\u043f\u043b\u0430\u0442\u043e\u043a, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0444\u0438\u043a\u0441\u044b \u0434\u043b\u044f  3 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0438 9 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\nAdobe \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 9 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043e\u0441\u043e\u0431\u043e\u0433\u043e \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u044f \u0441\u0442\u043e\u0438\u0442  \u043f\u0430\u0447\u043a\u0430 RCE \u0432 Photoshop (CVE-2023-21574 .. 21578)\n\nApple \u0441\u0440\u043e\u0447\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 iOS \u0438 macOS  \n\nCisco \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0441\u0440\u043e\u0447\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043a \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u043c\u0443 opensource \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u043c\u0443 \u043c\u043e\u0434\u0443\u043b\u044e  ClamAV, \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430  \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0430\u0440\u0441\u0435\u0440\u0435 HFS+ (CVE-2023-20032, CVSS 9.8).\n\nIntel \u0438\u0437\u043e \u0432\u0441\u0435\u0445 \u0441\u0438\u043b \u0440\u0430\u0437\u0432\u043b\u0435\u043a\u0430\u043b\u0430 \u0430\u0434\u043c\u0438\u043d\u043e\u0432, \u043f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e \u0434\u043b\u044f \u043d\u0430\u0447\u0430\u043b\u0430 \u043d\u0430\u0434\u043e \u043f\u0440\u043e\u0441\u0442\u043e \u043f\u0440\u043e\u0447\u0438\u0442\u0430\u0442\u044c 31 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c \u0438 \u0432\u043d\u0438\u043a\u043d\u0443\u0442\u044c \u0432 \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u044b, \u043e\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0435 \u0432 \u043a\u0430\u0436\u0434\u043e\u043c. \u041d\u0430 \u0434\u043e\u043b\u044e Software Guard Extensions (SGX) \u043f\u0440\u0438\u0445\u043e\u0434\u0438\u0442\u0441\u044f 5 CVE.\n\u0410 \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u043d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u044b\u0445 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f CVE-2021-39296  \u0441 CVSS 10.0 \u0432 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 IPMI lan+. \u0421\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f IMPI \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0430\u0442 \u0435\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f \u043a BMC \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root \u0431\u0435\u0437 \u0432\u0441\u044f\u043a\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n \u041a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e \u0443 Intel, \u043a\u0440\u043e\u043c\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u043e\u0432 \u0438 \u0441\u043e\u0444\u0442\u0430, \u043d\u0443\u0436\u043d\u044b \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043c\u0438\u043a\u0440\u043e\u043a\u043e\u0434\u0430 \u0447\u0438\u043f\u043e\u0432. \n\nSchneider \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u00ab\u0432\u0441\u0435\u0433\u043e\u00bb 10 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439, \u043e\u0442\u043d\u043e\u0441\u044f\u0449\u0438\u0445\u0441\u044f \u043a \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u043c EcoStruxture, StruxtureWave, Merten KNX \u0438 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c \u0434\u0440\u0443\u0433\u0438\u043c.  \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 StruxtureWave Data Center Expert (CVE-2023-25547..25555, CVSS \u043e\u0442 5.6 \u0434\u043e 8.8) \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u0432\u0430\u043b\u0438\u0434\u0430\u0446\u0438\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043d\u0435\u0448\u0442\u0430\u0442\u043d\u044b\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f. \n\nSiemens \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 22 \u043c\u0430\u0441\u0441\u0438\u0432\u043d\u044b\u0445 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044f \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0431\u043e\u043b\u0435\u0435 80 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445  \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445.\n\u041e\u0442\u043c\u0435\u0442\u0438\u043c  \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u0441\u043e\u0444\u0442\u0435 COMOS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438/\u0438\u043b\u0438 \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438  (CVE-2023-24482, CVSS 10.0).\n\u0421\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0445 \u043c\u0435\u0440 \u043f\u043e\u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u043b\u043e\u0445\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u044b \u0437\u0430\u043a\u0440\u044b\u0442\u043e\u0433\u043e (\u043f\u0440\u0438\u0432\u0430\u0442\u043d\u043e\u0433\u043e) \u043a\u043b\u044e\u0447\u0430 \u0432 SINUMERIK ONE an\u0438  SINUMERIK MC  (CVSS 9.3).\n\u0426\u0435\u043b\u044b\u0439 \u0431\u0443\u043a\u0435\u0442 \u0444\u0438\u043a\u0441\u043e\u0432 \u0432 Brownfield Connectivity \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0432 \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0435\u0439\u0441\u044f \u00ab\u043f\u043e\u0434 \u043a\u0430\u043f\u043e\u0442\u043e\u043c\u00bb \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435  OpenSSL", "creation_timestamp": "2023-02-19T09:01:50.000000Z"}]}