Files
git.stella-ops.org/out/feeds/icscisa-kisa/20251208/advisories.ndjson
StellaOps Bot bc0762e97d up
2025-12-09 00:20:52 +02:00

5 lines
3.4 KiB
Plaintext

{"advisory_id":"ICSA-25-123-01","affected_products":[{"product":"ControlSuite","vendor":"Example Corp","versions":["4.2.0","4.2.1"]}],"cvss":{"score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"cwe":["CWE-269"],"fetched_at":"2025-12-08T02:05:00Z","payload_sha256":"634552b3ed7ffc9abfd691b16a60a68c8d81631b6a99149b97db1b093442a9bb","published":"2025-10-13T12:00:00Z","references":["https://example.com/security/icsa-25-123-01.pdf","https://www.cisa.gov/news-events/ics-advisories/icsa-25-123-01"],"run_id":"icscisa-kisa-20251208T0205Z","severity":"High","signature":{"reason":"unsigned_source","status":"missing"},"source":"icscisa","source_url":"https://www.cisa.gov/news-events/ics-advisories/icsa-25-123-01","summary":"Example Corp ControlSuite RCE via exposed management service.","title":"Example ICS Advisory","updated":"2025-11-30T00:00:00Z"}
{"advisory_id":"ICSMA-25-045-01","affected_products":[{"product":"InfusionManager","vendor":"HealthTech","versions":["2.1.0","2.1.1"]}],"cvss":{"score":6.3,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L","version":"3.1"},"cwe":["CWE-319"],"fetched_at":"2025-12-08T02:05:00Z","payload_sha256":"b99750b070899a2e6455b3b8b7ca1dafa608cef5eb2c1f8ab40a21c5e22b731f","published":"2025-10-14T09:30:00Z","references":["https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-045-01","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11111"],"run_id":"icscisa-kisa-20251208T0205Z","severity":"Medium","signature":{"reason":"unsigned_source","status":"missing"},"source":"icscisa","source_url":"https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-045-01","summary":"HealthTech infusion pump vulnerabilities including two CVEs.","title":"Example Medical Advisory","updated":"2025-12-01T00:00:00Z"}
{"advisory_id":"KISA-2025-5859","affected_products":[{"product":"ControlBoard","vendor":"ACME","versions":["1.0.1.0084","2.0.1.0034"]}],"cvss":{"score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"cwe":["CWE-787"],"fetched_at":"2025-12-08T02:07:10Z","payload_sha256":"e3e599275e19a9b20555bfd1e637b77b97995a8b4b0a8ad348f57e3f1485fe29","published":"2025-11-03T22:53:00Z","references":["https://knvd.krcert.or.kr/rss/securityInfo.do","https://knvd.krcert.or.kr/detailDos.do?IDX=5859"],"run_id":"icscisa-kisa-20251208T0205Z","severity":"High","signature":{"reason":"unsigned_source","status":"missing"},"source":"kisa","source_url":"https://knvd.krcert.or.kr/detailDos.do?IDX=5859","summary":"Remote code execution in ControlBoard service (offline HTML snapshot).","title":"KISA sample advisory 5859","updated":"2025-12-02T00:00:00Z"}
{"advisory_id":"KISA-2025-5860","affected_products":[{"product":"Edge","vendor":"NetGateway","versions":["3.4.2","3.4.3"]}],"cvss":{"score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"cwe":["CWE-798"],"fetched_at":"2025-12-08T02:07:45Z","payload_sha256":"1fc74f47e392e8b952d0206583fefcea6db86447094106b462b9ff4c4f06fef1","published":"2025-11-03T22:53:00Z","references":["https://knvd.krcert.or.kr/rss/securityInfo.do","https://knvd.krcert.or.kr/detailDos.do?IDX=5860"],"run_id":"icscisa-kisa-20251208T0205Z","severity":"Medium","signature":{"reason":"unsigned_source","status":"missing"},"source":"kisa","source_url":"https://knvd.krcert.or.kr/detailDos.do?IDX=5860","summary":"Authentication bypass via default credentials in NetGateway appliance.","title":"KISA sample advisory 5860","updated":"2025-12-02T00:00:00Z"}