diff --git a/doc/cna_readme_notes/cnas_with_html_advisories.md b/doc/cna_readme_notes/cnas_with_html_advisories.md index 3c0b0f1..87dde4c 100644 --- a/doc/cna_readme_notes/cnas_with_html_advisories.md +++ b/doc/cna_readme_notes/cnas_with_html_advisories.md @@ -269,8 +269,42 @@ https://support.avaya.com/security ## Becton, Dickinson and Company (BD) ### Advisory https://cybersecurity.bd.com/bulletins-and-patches +#### Notes +There is a filter on the left-hand size of the list. filtering bulletins allows you to get the security bulletins. +Each bulletin may have some different keys than what is in the provided example below: #### Captured Data Potential From Advisory +``` +# Some additional keys on other advisories: +{ + :bulletin_id => 'Apache Log4j Vulnerability: BD Third-Party Components Impacted', + :background => 'BD is aware of and currently monitoring Apache Log4J vulnerabilities which impact third-party product(s) that are utilized with certain BD software-enabled products. These third-party vulnerabilities are not specific to BD or our products. A malicious actor with network access to an impacted product may exploit this issue to gain full control of the target system and/or perform denial-of-service attacks. BD has not received any reports regarding these vulnerabilities being exploited on BD products.', + :scope => [ + { + :cve_id => 'CVE-2021-44228', + :severity => 'Critical', + :description => 'Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.' + }, + { + :cve_id => 'CVE-2021-45046', + :severity => 'Critical', + :description => 'It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments.' + } + ], + :response => 'BD is currently working to test and validate the patch(es) or other mitigations for BD products that use the affected third-party components. Some patches may already be available. Please refer to the Bulletins and Patches page for all approved product security patching notifications. Additionally, we recommend the following compensating controls for customers using BD products that utilize impacted third-party components.Execute updates to malware protection, where available. Ensure data has been backed up and stored according to your individual processes and disaster recovery procedures. Do not allow unauthorized access to the network. Only allow authorized users to have access to the network/system. Ensure your firewall and antivirus protection are updated with the latest updates. Minimize network exposure to devices and ensure devices are not directly accessible from the internet unless essential.Customers that maintain patches independent of BD automated delivery should ensure that available security patches and recommendations are applied as the acting responsible entity in order to maintain the correct security posture of the system(s).', + :affected_third_party_products => [ + { + :third_party_component => 'VMware vCenter', + :products => [ + 'BD Kiestra™ Total Lab Automation (TLA) with a Systems Control Unit (SCU)', + 'BD Kiestra™ Work Cell Automation (WCA) with a Systems Control Unit (SCU)', + 'BD Kiestra™ ReadA with a Systems Controls Unit (SCU)' + ] + } + ], + :additional_resources => 'VMWare Advisory: https://www.vmware.com/security/advisories/VMSA-2021-0028.html' +} +``` ## Bitdefender ### Advisory https://www.bitdefender.com/support/security-advisories/