Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-0861: ONEKEY with its technology-leading firmware analysis platform for your product cybersecurity 🙌

NetModule NSRW web administration interface executes an OS command constructed with unsanitized user input. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. This issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103. The issue affects NSRW packaged by Phoenix Contact routers: from 4.6.72.0 before 4.6.72.101, from 4.6.73.0 before 4.6.73.101.

CVE
#vulnerability#web#auth

OVER 1.5 BILLION ATTACKS ON IOT/OT DEVICES IN 2021*.

Zero setup. Instant result. Lifetime monitoring.

UPCOMING EVENTS

DO YOU CARE about what’s inside of what you produce, choose or operate as IoT/OT devices?

Implementing complete software supply chain transparency through automated security analysis and compliance checks will substantially support your core mission.

WHY DO I NEED a Software-Bill-Of-Material (SBOM)?

A Software Bill Of Materials (SBOM) lists all software components of a given software. As a producer, it will reduce unscheduled work and avoid components with known vulnerabilities from ending in your products. When choosing or purchasing products, an SBOM will enable a more accurate calculation of total cost of ownership and easier due diligence. As operator, an SBOM will enable you faster identification and resolution of vulnerabilities.

How to close the Product cybersecurity gap ?

Whether you develop IoT or OT devices yourself or buy them from suppliers,
ONEKEY can automate and maximize your product cybersecurity and
compliance of your connected devices now.

Automated cybersecurity tests and compliance checks.

Transparent Software Bill of Materials (SBOM).

Automatic testing of third-party components.

Ongoing monitoring of previous versions.

Seamless integration into your processes & tools.

Full automation possible.

With little effort and low costs, you sustainably improve
product cybersecurity in your company, authority or organization.

Automated solutions tailored to Producers and operators
of IoT/OT devices.

The ONEKEY firmware analysis platform has been developed as an automated and integrated solution specifically for producers and operators of IoT/OT devices.

We are happy to advise you on the possibilities, benefits, and process integration without obligation.

Book your personal initial consultation NOW – or find out more in the following areas:

PRODUCER

We develop/integrate IoT/OT devices for our customers.

OPERATOR

We purchase and use IoT/OT devices in our organization.

Customers who already trust us…

DEVELOPED BY EXPERTS

ONEKEY is a technology-leading European firmware analysis platform available worldwide. The core technology was developed by world-leading pentesting experts and has been continuously enhanced since then.

ONEKEY is available as Software-as-a-Service (SaaS), or on-premise for automated security and compliance analysis of connected devices and embedded systems running IoT/OT firmware. ONEKEY does not require source code, network or physical access.

The platform provides complete supply chain transparency through automated Software Bill Of Materials (SBOM), deep security checks, compliance analysis, and product lifetime monitoring including 24/7 auto-alerting for new vulnerabilities. The ONEKEY firmware analysis platform provides an easy to use web interface and a powerful API that allows for seamless integration with existing tools such as CI/CD, vulnerability management platforms, or ticketing systems.

ONEKEY’s security experts are available for implementation, API integration, and consultation on your current product cybersecurity process.

What our customers say…

“ONEKEY’s capabilities and security expertise made it a truly eye-opening experience to work with them.”

Nigel HansonAppSec + Hardware Security Specialist at Trimble.

“ONEKEY’s automated binary software analysis simplifies product security at Snap One by reducing manual efforts while increasing transparency and confidence. ​ We enjoyed a smooth onboarding experience and highly recommend the excellent support from a team of experts.” ​

Connie GraySr. Director of Engineering, ​ Cybersecurity & Product Security at Snap One.

“We use ONEKEY to check every piece of software for potential risks before it even reaches release candidate status, at which point any issues are immediately analyzed and fixed. This allows us to effectively secure new features and interfaces.”

Giulio GrazziSenior Security Consultant at Swisscom.

“ONEKEY helps us to uncover critical vulnerabilities in embedded devices in a fully automated way. This allows us to target manual testing efforts more efficiently on business logic issues.“

Wolfgang BaumgartnerHead of Global Security Consulting at Atos.

“We provide best-in-class services to our IoT customers, helping them ensure security throughout their entire product lifecycle. So naturally we want to deliver continuous firmware monitoring and vulnerability assessments using the best tools and solutions in the business. ONEKEY’s automated firmware analyses help us to deliver our services efficiently and with unparalleled quality.”

Joël ConusFirst Vice President IoT R&D and Services at Kudelski IoT.

“Ever since we integrated ONEKEY into our security assessments, the automated analyses help us reducing substantially the effort of time-consuming manual analyses.”

Yann ChalenconHead of Cyber Security Services at wizlynx group

Previous

Next

Security reports - whitepapers - downloads

Click. Fill Form. Download.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907