Vulnerabilities > Insufficient Verification of Data Authenticity
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-10-18 | CVE-2023-38552 | Insufficient Verification of Data Authenticity vulnerability in multiple products When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js. | 7.5 |
2023-10-10 | CVE-2023-42782 | Insufficient Verification of Data Authenticity vulnerability in Fortinet Fortianalyzer A insufficient verification of data authenticity vulnerability [CWE-345] in FortiAnalyzer version 7.4.0 and below 7.2.3 allows a remote unauthenticated attacker to send messages to the syslog server of FortiAnalyzer via the knoweldge of an authorized device serial number. | 5.3 |
2023-10-06 | CVE-2023-5366 | Insufficient Verification of Data Authenticity vulnerability in multiple products A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. | 5.5 |
2023-09-21 | CVE-2015-8371 | Insufficient Verification of Data Authenticity vulnerability in Getcomposer Composer 1.0.0 Composer before 2016-02-10 allows cache poisoning from other projects built on the same host. | 8.8 |
2023-09-20 | CVE-2023-43636 | Insufficient Verification of Data Authenticity vulnerability in Linuxfoundation Edge Virtualization Engine In EVE OS, the “measured boot” mechanism prevents a compromised device from accessing the encrypted data located in the vault. As per the “measured boot” design, the PCR values calculated at different stages of the boot process will change if any of their respective parts are changed. This includes, among other things, the configuration of the bios, grub, the kernel cmdline, initrd, and more. However, this mechanism does not validate the entire rootfs, so an attacker can edit the filesystem and gain control over the system. As the default filesystem used by EVE OS is squashfs, this is somewhat harder than an ext4, which is easily changeable. This will not stop an attacker, as an attacker can repackage the squashfs with their changes in it and replace the partition altogether. This can also be done directly on the device, as the “003-storage-init” container contains the “mksquashfs” and “unsquashfs” binaries (with the corresponding libs). An attacker can gain full control over the device without changing the PCR values, thus not triggering the “measured boot” mechanism, and having full access to the vault. Note: This issue was partially fixed in these commits (after disclosure to Zededa), where the config partition measurement was added to PCR13: • aa3501d6c57206ced222c33aea15a9169d629141 • 5fef4d92e75838cc78010edaed5247dfbdae1889. This issue was made viable in version 9.0.0 when the calculation was moved to PCR14 but it was not included in the measured boot. | 8.8 |
2023-09-14 | CVE-2023-26141 | Insufficient Verification of Data Authenticity vulnerability in Contribsys Sidekiq Versions of the package sidekiq before 7.1.3 are vulnerable to Denial of Service (DoS) due to insufficient checks in the dashboard-charts.js file. | 4.9 |
2023-09-13 | CVE-2023-20236 | Insufficient Verification of Data Authenticity vulnerability in Cisco IOS XR A vulnerability in the iPXE boot function of Cisco IOS XR software could allow an authenticated, local attacker to install an unverified software image on an affected device. This vulnerability is due to insufficient image verification. | 7.8 |
2023-09-06 | CVE-2023-4589 | Insufficient Verification of Data Authenticity vulnerability in Delinea Secret Server 10.9.000002 Insufficient verification of data authenticity vulnerability in Delinea Secret Server, in its v10.9.000002 version. | 7.2 |
2023-08-23 | CVE-2023-38831 | Insufficient Verification of Data Authenticity vulnerability in Rarlab Winrar RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. | 7.8 |
2023-08-11 | CVE-2023-22955 | Insufficient Verification of Data Authenticity vulnerability in Audiocodes products An issue was discovered on AudioCodes VoIP desk phones through 3.4.4.1000. | 7.8 |