Skip to content
  Sunday 9 November 2025
Trending
April 29, 2025<h3>Elon Musk’s Task Force Secures Access to Nuclear Network Accounts</h3> July 21, 2025The importance of mental health awareness has been increasingly recognized in recent years. It is crucial to break the stigma surrounding mental health and promote open conversations about mental well-being. By raising awareness and providing education on mental health issues, we can help individuals feel more comfortable seeking help and support when needed.<br /> <br /> One of the key ways to promote mental health awareness is through education and advocacy. This includes providing information on common mental health conditions, as well as resources for individuals who may be struggling with their mental health. By normalizing conversations about mental health, we can create a more supportive and understanding environment for those in need.<br /> <br /> Furthermore, promoting mental health awareness can help reduce the prevalence of mental health disorders in society. By encouraging early intervention and treatment, individuals can receive the support they need to manage their mental health and prevent more severe conditions from developing. This can ultimately lead to a healthier and happier population overall.<br /> <br /> It is also important to address the impact of mental health on individuals’ daily lives and relationships. Mental health issues can affect every aspect of a person’s life, from their work performance to their personal relationships. By promoting mental health awareness, we can help individuals recognize the signs of mental health issues and seek help before these issues escalate.<br /> <br /> In conclusion, promoting mental health awareness is essential for creating a more supportive and understanding society. By breaking the stigma surrounding mental health and providing education and resources, we can help individuals feel more comfortable seeking help when needed. This can lead to improved mental well-being and a healthier population overall. April 3, 2025Hitachi Energy RTU500 Series | CISA August 24, 2024Principal Cybersecurity Engineer – P4 January 4, 2022How To Create WhatsApp Account with Free US Number 2022 May 30, 2024Westermo EDW-100 | CISA January 16, 2025As a passionate advocate for environmental conservation, I believe it is crucial for us to prioritize the protection of our planet’s natural resources. Our oceans are home to a diverse range of marine life and play a vital role in sustaining life on Earth. However, they are facing numerous threats including pollution, overfishing, and climate change.<br /> <br /> One of the most pressing issues facing our oceans is plastic pollution. Every year, millions of tons of plastic waste end up in our oceans, harming marine animals and ecosystems. It is essential for us to reduce our use of single-use plastics and properly dispose of waste to prevent further damage to our oceans.<br /> <br /> Overfishing is another major threat to our oceans. Many fish populations are being depleted at unsustainable rates, leading to negative impacts on marine ecosystems and coastal communities that rely on fishing for their livelihoods. Implementing sustainable fishing practices and protecting marine protected areas are crucial steps in addressing this issue.<br /> <br /> Climate change is also having a significant impact on our oceans, leading to rising sea levels, ocean acidification, and more frequent and severe extreme weather events. It is essential for us to reduce our carbon footprint and transition to renewable energy sources to mitigate the effects of climate change on our oceans and planet.<br /> <br /> In conclusion, it is up to each and every one of us to take action to protect our oceans and ensure a sustainable future for generations to come. By making conscious choices in our daily lives, supporting conservation efforts, and advocating for policies that prioritize environmental protection, we can make a positive impact on the health of our oceans and planet as a whole. Let us all work together to safeguard our oceans for future generations. February 27, 2025Lead Elastic Stack Cybersecurity Engineer December 23, 2024AI creates 10,000 undetectable malware variants in 88% of cases August 1, 2023​APSystems Altenergy Power Control | CISA
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  VISAM VBASE Automation Base | CISA
Threat Advisories

VISAM VBASE Automation Base | CISA

Mister CybersecurityMister Cybersecurity—March 21, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


1. EXECUTIVE SUMMARY

  • CVSS v3 5.5
  • ATTENTION: Low attack complexity 
  • Vendor: VISAM 
  • Equipment: VBASE 
  • Vulnerabilities: Improper Restriction of XML External Entity Reference

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to obtain sensitive information from the target device. 

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

VISAM reports these vulnerabilities affect the following VBASE products:  

  • VBASE Automation Base: versions prior to 11.7.5 

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 

Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file. 

CVE-2022-41696 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 

3.2.2 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 

Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file. 

CVE-2022-43512 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 

3.2.3 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 

Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file. 

CVE-2022-45121 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 

3.2.4 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 

Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file. 

CVE-2022-45468 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 

More stories

Enhancing Cyber Resilience: Insights from the CISA Healthcare and Public Health Sector Risk and Vulnerability Assessment

December 15, 2023

Rockwell Automation FactoryTalk View ME

November 12, 2024

​Siemens Solid Edge SE2023 | CISA

August 10, 2023

National Instruments LabVIEW | CISA

July 29, 2025

3.2.5 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 

Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file. 

CVE-2022-45876 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 

3.2.6 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 

Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file. 

CVE-2022-46286 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 

3.2.7 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 

Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file. 

CVE-2022-46300 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). 

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Multiple 
  • COUNTRIES/AREAS DEPLOYED: Worldwide 
  • COMPANY HEADQUARTERS LOCATION: Germany 

3.4 RESEARCHER

Kimiya, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to CISA. 

4. MITIGATIONS

VISAM recommends users update to VBASE 11.7.5 or later. The update can be performed via the VBASE Editor update dialog on machines with secure access to the internet.  Users of machines without internet access must manually update by submitting a request form to receive a download link. 

For more information, users should contact VISAM using the information provided on their contact page (German language). 

CISA recommends users take the following measures to protect themselves from social engineering attacks: 

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. 

CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely. These vulnerabilities have low attack complexity. 



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

Keysight N6845A Geolocation Server | CISA
Siemens RADIUS Client of SIPROTEC 5 Devices
Related posts
  • Related posts
  • More from author
Threat Advisories

CISA Releases Four Industrial Control Systems Advisories

November 6, 20250
Threat Advisories

ABB FLXeon Controllers | CISA

November 6, 20250
Threat Advisories

Advantech DeviceOn/iEdge | CISA

November 6, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Senior Engineer (DAST SME)

November 8, 20250
Careers

Senior Cybersecurity & Compliance Consultant

November 8, 20250
Careers

Sr. Lead Cybersecurity Architect

November 8, 20250
Careers

Cybersecurity Subject Matter/Functional Expert III

November 8, 20250
Careers

Cybersecurity Senior Data Analyst, Bureau of Audit Services

November 8, 20250
Careers

IT CYBERSECURITY SPECIALIST (CUSTSPT)

November 8, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Senior Engineer (DAST SME)
  • Senior Cybersecurity & Compliance Consultant
  • Sr. Lead Cybersecurity Architect
  • Cybersecurity Subject Matter/Functional Expert III
  • Cybersecurity Senior Data Analyst, Bureau of Audit Services

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures