home.social

#csaf — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #csaf, aggregated by home.social.

  1. #OT #Advisory VDE-2026-042
    CODESYS Modbus TCP Server - Improper resource management

    CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
    #CVE CVE-2026-35227

    certvde.com/en/advisories/vde-

    #CSAF codesys.csaf-tp.certvde.com/.w

  2. #OT #Advisory VDE-2026-042
    CODESYS Modbus TCP Server - Improper resource management

    CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
    #CVE CVE-2026-35227

    certvde.com/en/advisories/vde-

    #CSAF codesys.csaf-tp.certvde.com/.w

  3. #OT #Advisory VDE-2026-042
    CODESYS Modbus TCP Server - Improper resource management

    CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
    #CVE CVE-2026-35227

    certvde.com/en/advisories/vde-

    #CSAF codesys.csaf-tp.certvde.com/.w

  4. "The Common Security Advisory Framework (#CSAF) is an effective and efficient means by which manufacturers can communicate their recommendations for action on vulnerabilities."

    writes the Institute for Occupational Safety and Health (a main department of the German Social Accident Insurance) here:

    dguv.de/ifa/fachinfos/industri

    further
    "New EU regulations place greater responsibility on manufacturers of products with digital elements.

    For example, Article 14 (8) of the Cyber Resilience Act (CRA) sets out "reporting obligations of manufacturers", together with strict deadlines."

    Note that csaf.io/specification/ version 2.1 is available as "Committee Specification Draft 02" since a few weeks. The technical committee welcomes comments!

  5. A new pull request for Vulnerability-Lookup adds a CSAF producer that publishes advisories for many manufacturers.

    This is great for defenders and researchers, as it increases the amount of detailed vulnerability information available.

    It will push the number of ingested feeds to more than 50 unique sources, highlighting the growing diversity of our data sources.

    If someone tells you there is a single source of truth for vulnerability information, they’re ignoring the reality: vulnerability intelligence comes from many different sources.

    Thanks to @rafi0t for the continuous work on adding CSAF and feeds to vulnerability-lookup

    #gcve #cve #cybersecurity #csaf #vulnerability #opendata #opensource

    🔗 The new PR with many new CSAF sources github.com/vulnerability-looku
    🔗 The open source vulnerability-lookup software vulnerability-lookup.org/
    🔗 GCVE instance db.gcve.eu/

    @gcve
    @cedric

  6. @bagder However, it's the classic chicken-egg problem: Why should I start? The answer is: #curl is a mature project and can lead the way.
    We are happy to help you and others getting started. Feel free to reach out to our #CSAF team at [email protected].

    (2/2)

  7. @bagder Great that you are considering #CSAF. We think that CSAF is a gamechanger: CSAF works for open source as well as closed source, hardware, specifications etc. - basically anything you can think of writing a security advisory or #VEX for.
    Supply Chain Security: No one can secure single handed - everyone is needed. A single format: You can profit from the upstream CSAFs, your downstream users profit from your CSAFs.

    (1/2)

  8. Für viele Unternehmen sind die Anforderungen an das #Schwachstellenmanagement in der #Cybersicherheit ein zunehmend dickes Brett.

    Neben der reinen Menge an Meldungen ist ein weiteres Problem, dass #Cybersecurity-#Advisories bislang in den unterschiedlichen Formaten, also beispielsweise als PDF, als Website oder als Textfile veröffentlicht werden.

    Deshalb empfiehlt das #BSI Unternehmen den #CSAF-Einsatz, um Risiken schneller erfassen und effizienter bewerten zu können:

    bsi.bund.de/SharedDocs/Downloa

  9. Want to know how to write and distribute #SecurityAdvisories that can be parsed and processed automatically?

    Freshly announced are this years workshops for the Common Security Advisory Framework (#CSAF). They will be held in Nuremberg, Germany, November 10th to 12th.

    See csaf.io/workshops/2025/
    (right after this are the CSAF Community-Days).

  10. #OT #Advisory VDE-2025-044
    Weidmueller: Industrial ethernet switches are affected by multiple vulnerabilities

    #CVE CVE-2025-41651, CVE-2025-41652, CVE-2025-41649, CVE-2025-41650, CVE-2025-41653

    certvde.com/en/advisories/VDE-

    #CSAF weidmueller.csaf-tp.certvde.co

  11. #OT #Advisory VDE-2025-041
    Weidmueller: ResMa is affected by a Vulnerability for ASP.NET AJAX

    Weidmueller product ResMa is affected by ASP.NET AJAX vulnerability.
    Weidmueller has released a new firmware for the affected product to fix the vulnerability.
    #CVE CVE-2025-3600

    certvde.com/en/advisories/VDE-

    #CSAF weidmueller.csaf-tp.certvde.co

  12. #OT #Advisory #Update VDE-2023-046
    WAGO: Multiple products vulnerable to local file inclusion

    An attacker with administrative privileges which can access sensitive files can additionally access them in an unintended, undocumented way.
    UPDATE 07.05.2025: The fixed versions have been updated, because the previously mentioned versions are still vulnerable to this issue. More details have been added to the hardware devices. More affected version numbers were added to the firmwares.
    #CVE CVE-2023-4089

    certvde.com/en/advisories/VDE-

    #CSAF wago.csaf-tp.certvde.com/.well

  13. Searching for an #OT #Advisory?
    Want it machine readable?
    Have a look at our #csaf aggregator aggregator.certvde.com for advisories of 35+ OT and #ICS vendors that partner with CERT@VDE.

    See certvde.com/en/more/csaf/ for a full list of the trusted providers used on the aggregator.

  14. Automating finding and parsing of security advisories? That is what the Common Security Advisory Framework (CSAF) attempts to. csaf.io. There are going to be workshops and community days in the 2nd week of December in Germany. See csaf.io/workshop/ .

    #Security #CSAF

    The call for presentations is until the 3rd of November. The location is still to be announced within Germany. I guess Munich or Bonn. (My company is contracted by the BSI to help with CSAF software and spec)

  15. Samen met het NCSC en collega's van DPC zit ik dinsdag 1 oktober in een track op de altijd mooie 'ONE Conference 2024'. We hebben het over waarom 'weten wat je hebt' belangrijk is in kwetsbaarhedenbeheer en hoe 'real time vulnerability feeds', CSAF en SBOMs je daarbij kunnen helpen. Als je op de ONE bent, kom langs! :-). one-conference.nl/side-event/n #oneconference24 #sbom #csaf #ncscnl

  16. CSAF Walker: Working with CSAF providers in Rust

    A quick introduction blog post to a Rust crate & CLI for working with CSAF advisories and providers.

    dentrassi.de/2024/05/19/csaf-w

    #csaf #opensource #rustlang #SoftwareSupplyChain

  17. vulnerability-lookup version v0.7.0 has been released.

    - News feed added
    - Support for CSAF sources (CERT Bund, RedHat, Siemens, CISA, CISCO, Nozomi Networks, OpenXchange, SICK)
    - OSSF Malicious packages repository
    - Pagination for recent vulnerabilities (API & Web)

    🔗 Source code github.com/cve-search/vulnerab

    🔗 Vulnerability lookup online vulnerability.circl.lu/

    #cve #vulnerability #vulnerabilities #csaf #infosec

  18. Today's Live Cyber Security Awareness Forum panel session is on "The problem of employees using FREE stuff from the Internet."

    Everyone is welcome.
    #csaf #cybersecurityawarenessforum

    us02web.zoom.us/webinar/regist

  19. Working in cyber security can wear you down. Even if you love the work.

    The results of your good work rarely show as a big red, flashing sign that says "You succeeded". Sometimes you wonder if anyone even notices.

    But when you can speak to others who are facing the same issues in other organizations, you realize that the work you are doing is really important.

    One day, you'll likely see a news story where another organization just like yours fell victim to an attack, and you realize that what you've done makes it less likely to happen in your organization.

    That's when you understand the value of what you are contributing.

    Come and join the Cyber Security Awareness Forum live panel discussion today, and hear from others in the security awareness industry who have dealt with similar challenges to the ones you're facing.

    us02web.zoom.us/webinar/regist

    #csaf #cybersecurityawarenessforum #securityawareness #securitymanagement #riskmanagement #humanriskmanagement

  20. There are some well-known reasons why gamification is considered to be a good tool for cyber security training and awareness programs.

    There are also some misconceptions about gamification that tend to lead people to dismiss the approach.

    In today's live Cyber Security Awareness Forum panel discussion, we'll dig into "The pros and cons of gamification in a security awareness program"

    Joing us at 1pm EDT today (Wednesday, November 1), and bring your questions or comments...

    us02web.zoom.us/webinar/regist

    #csaf #cybersecurityawarenessforum #gamification #securityawareness #securitymanagement #riskmanagement #securitytraining

  21. “Vulnerability management is becoming increasingly important” – Greenbone CEO Dr. Jan-Oliver Wagner at PITS Congress

    Greenbone CEO Dr. Jan-Oliver Wagner was invited as an expert to take part in the panel discussion “Putting your finger in the wound – managing or closing vulnerabilities?" at the Public IT Security Congress initiated by Behoerdenspiegel.

    More at the Greenbone Blog via @mfeilner

    greenbone.net/en/blog/vulnerab

    #PublicITSecurity #CRA #CSAF #VulnerabilityManagement #Greenbone #OpenVas

  22. Are You working with Software Security Advisories? Ever heard of #CSAF? A study from members of the Human Factors in Security and Privacy Group @FAU tries to identify difficulties in reception and processing of security advisories and the decision-making process involved.

    Please support the study by taking part in this anonymous 10 minute survey:

    user-surveys.cs.fau.de/?r=secu

    Thx! 💐​

  23. SBOM alone may not encode enough detail to separate non-exploitable vulnerabilities from exploitable ones writes Surendra Pathak in our latest guest blog on #VDR, #VEX, #OpenVEX and #CSAF openssf.org/blog/2023/09/07/vd

  24. Over 225 security professionals have signed up for today's bi-weekly Cyber Security Awareness Forum.

    Think of these sessions as: "The Best Part of Your Security Week"

    Attendees love the casual atmosphere, the panel format and the variety of perspectives from CISOs and security awareness managers.

    Why not join us today at 1pm EDT, to hear what other security professionals have to say about employee-related risks "beyond phishing links"?

    us02web.zoom.us/webinar/regist

    #csaf #cybersecurityawarenessforum #securityawareness #securityculture #securitymanagement #riskmanagement

  25. Learn what really takes up security awareness managers' time in their jobs.

    Join us for today's Live Cyber Security Awareness Forum panel session on:

    "A day in the life of a security awareness manager (tasks and challenges)"

    We have live audience Q&A with an industry expert panel, to share insights and lessons learned about managing security awareness programs.

    us02web.zoom.us/webinar/regist

    #csaf #cybersecurityawarenessforum #securityculture #securitymanagement #riskmanagement

  26. If your organization has stories to share about how role-based security awareness is making a difference, others want to hear about it.

    Too often, organizations miss the opportunity to provide quality security training to staff who have a common risk environment.

    Attackers are focusing on roles now, so they can create more compelling pretexts for social engineering.

    Soon, it won't be just gift card scams. There will be attacks targeting people like software librarians that give source code access to privileged access to remote attackers.

    What ignored roles do you see that can receive value from more focused security training?

    Join our live Cyber Security Awareness Forum today at 1pm EDT, where you can hear from an expert panel and learn from live audience Q&A.

    us02web.zoom.us/webinar/regist

    #csaf #cybersecurityawarenessforum #securitytraining #securityawareness #riskmanagement #securitymanagement #instructionaldesign

  27. It's a great day to talk about "cyber security industry statistics" in the Live Cyber Security Awareness Forum.

    Join the panel discussion with live audience Q&A today at 1pm ET.
    #csaf #cybersecurity #statistics #riskmanagement #securityculture
    us02web.zoom.us/webinar/regist

  28. Security industry statistics like "total cybercrime losses" and "percent of breaches involving human vulnerabilities" can be used to make business cases for security awareness training.

    But sometimes those stats are misleading.

    Join us as we explore the use of industry statistics related to security awareness and impacts of human vulnerability this week in the Live Cyber Security Awareness Forum with panel and audience Q&A.
    #csaf #cybersecurityawarenessforum #statistics

    us02web.zoom.us/webinar/regist

  29. Die US-Behörde CISA hat am 10. November 2022 einen 3 Punkteplan für effizientes Schwachstellenmanagement veröffentlicht: cisa.gov/blog/2022/11/10/trans

    Zentrale Punkte sind der #CSAF-Standard und das #VEX-Profil: Maschinenlesbare #Advisory reduzieren den manuellen Aufwand und mitigieren effektiver Schwachstellen.

    Die #CISA zeigt hiermit offiziell ihre Unterstützung dieses Standards. Das #BSI erwartet eine Signalwirkung für alle PSIRTs – speziell auch #IndustrialSecurity.

    #DeutschlandDigitalSicherBSI

  30. Das Common Security #Advisory Framework (#CSAF) liefert maschinenverarbeitbare Advisories

    Gemeinsam mit dem Cyber-Defense Campus (CYD Campus) in der Schweiz arbeitet das #BSI daran #OpenSource-#Tools bereitzustellen, damit alle Beteiligten einer Supply-Chain CSAF-Advisories erzeugen und verwalten können, um effizienter Schwachstellen-Informationen auszutauschen und ihre IT-Sicherheit zu verbessern.
    👉 admin.ch/gov/de/start/dokument

    #IndustrialSecurity #Secvisogram #DeutschlandDigitalSicherBSI