Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12512PUBLISHED: 2021-01-22Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513PUBLISHED: 2021-01-22Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514PUBLISHED: 2021-01-22Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
CVE-2020-12525PUBLISHED: 2021-01-22M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CVE-2020-12511PUBLISHED: 2021-01-22Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.
User Rank: Author
7/23/2020 | 1:27:51 PM
In the text and linked BlackHat synopsis, the author describes how multiple messages under an AEAD scheme like AES-GCM can be decrypted successfully by multiple keys. I'd say it is unsurprising they decrypt (any key will decrypt the message, just most of the messages would be garbage), but for the security properties of any AEAD construction to hold, the authentication tag should be invalid for the message afterwards. The text reads like the author may have found a way where in specific constructions this is not the case, so I am very excited to read more details about the attack.
The number one reason why I love applied cryptography. You never stop learning :-)
Best, Johannes