<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Disclosure on System Overlord</title><link>https://systemoverlord.com/tags/disclosure.html</link><description>Recent content in Disclosure on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Fri, 19 May 2017 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/disclosure/index.xml" rel="self" type="application/rss+xml"/><item><title>Belden Garrettcom 6K/10K Switches: Auth Bypasses, Memory Corruption</title><link>https://systemoverlord.com/2017/05/19/belden-garrettcom-6k-10k-switches-auth-bypasses-memory-corruption.html</link><pubDate>Fri, 19 May 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/05/19/belden-garrettcom-6k-10k-switches-auth-bypasses-memory-corruption.html</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Vulnerabilities were identified in the Belden GarrettCom 6K and 10KT (Magnum) series
network switches. These were discovered during a black box assessment and
therefore the vulnerability list should not be considered exhaustive;
observations suggest that it is likely that further vulnerabilities exist.
It is strongly recommended that GarrettCom undertake a full whitebox security
assessment of these switches.&lt;/p&gt;
&lt;p&gt;The version under test was indicated as: 4.6.0. Belden Garrettcom released
an advisory on 8 May 2017, indicating that issues were fixed in 4.7.7:
&lt;a href="https://www.belden.com/hubfs/support/security/bulletins/Belden-GarrettCom-MNS-6K-10K-Security-Bulletin-BSECV-2017-8.pdf?hsLang=en"&gt;https://www.belden.com/hubfs/support/security/bulletins/Belden-GarrettCom-MNS-6K-10K-Security-Bulletin-BSECV-2017-8.pdf?hsLang=en&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is a local copy of an &lt;a href="http://seclists.org/fulldisclosure/2017/May/65"&gt;advisory posted to the Full Disclosure mailing list&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Security Issues in Alerton Webtalk (Auth Bypass, RCE)</title><link>https://systemoverlord.com/2017/04/27/security-issues-in-alerton-webtalk-auth-bypass-rce.html</link><pubDate>Thu, 27 Apr 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/04/27/security-issues-in-alerton-webtalk-auth-bypass-rce.html</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Vulnerabilities were identified in the Alerton Webtalk Software supplied by
Alerton. This software is used for the management of building automation
systems. These were discovered during a black box assessment and therefore
the
vulnerability list should not be considered exhaustive. Alerton has
responded
that Webtalk is EOL and past the end of its support period. Customers
should
move to newer products available from Alerton. Thanks to Alerton for prompt
replies in communicating with us about these issues.&lt;/p&gt;</description></item></channel></rss>