| CVE # | Advisory name | Product(s) | Severity | Last Updated | ||
|---|---|---|---|---|---|---|
| NETSCOUT-SA-PFOS-6.8.1-OPENSSL | OpenSSL Update | PFOS | N/A | |||
|
OpenSSL Update NETSCOUT-SA-PFOS-6.8.1-OPENSSL Related Product(s): PFOS First Published: OverviewNETSCOUT has updated the OpenSSL component in PFOS version 6.8.1. This update upgrades from version 3.5.4 to 3.5.5, incorporating upstream fixes, performance improvements, and security hardening. Component Details
Revision History
|
||||||
| NETSCOUT-SA-PFOS-6.8.1-OPENSSH | OpenSSH Update | PFOS | N/A | |||
|
OpenSSH Update NETSCOUT-SA-PFOS-6.8.1-OPENSSH Related Product(s): PFOS First Published: OverviewNETSCOUT has updated the OpenSSH component in PFOS version 6.8.1. This update includes an upgrade from version 10.1p1 to 10.2p1, incorporating upstream fixes, performance improvements, and security hardening. Component Details
Revision History
|
||||||
| NETSCOUT-SA-PFOS-6.8.1-NGINX | NGINX Update | PFOS | N/A | |||
|
NGINX Update NETSCOUT-SA-PFOS-6.8.1-NGINX Related Product(s): PFOS First Published: OverviewNETSCOUT has updated the NGINX component in PFOS version 6.8.1. This update upgrades from version 1.28.0 to 1.28.2, incorporating upstream fixes, performance improvements, and security hardening. Component Details
Revision History
|
||||||
| CVE-2025-32986 | File Access Vulnerability | nGeniusONE | High | |||
|
File Access Vulnerability CVE-2025-32986 Related Product(s): nGeniusONE First Published: Summary We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com. Fixed Software |
||||||
| CVE-2025-32985 | Hardcoded Credentials | nGeniusONE | Critical | |||
|
Hardcoded Credentials CVE-2025-32985 Related Product(s): nGeniusONE First Published: Summary We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com. Fixed Software |
||||||
| CVE-2025-32984 | Stored Cross-Site Scripting | nGeniusONE | Medium | |||
|
Stored Cross-Site Scripting CVE-2025-32984 Related Product(s): nGeniusONE First Published: Summary We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com. Fixed Software |
||||||
| CVE-2025-32983 | Stack Trace Error | nGeniusONE | High | |||
|
Stack Trace Error CVE-2025-32983 Related Product(s): nGeniusONE First Published: Summary We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com. Fixed Software |
||||||
| CVE-2025-32982 | Broken Authorization Schema | nGeniusONE | High | |||
|
Broken Authorization Schema CVE-2025-32982 Related Product(s): nGeniusONE First Published: Summary We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com. Fixed Software |
||||||
| CVE-2025-32981 | Insecure Permissions | nGeniusONE | High | |||
|
Insecure Permissions CVE-2025-32981 Related Product(s): nGeniusONE First Published: Summary We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com. Fixed Software |
||||||
| CVE-2025-32979 | Arbitrary File Creation | nGeniusONE | Medium | |||
|
Arbitrary File Creation CVE-2025-32979 Related Product(s): nGeniusONE First Published: Summary We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com. Fixed Software |
||||||
| CVE-2025-32980 | Weak Sudo Configuration | nGeniusONE | Critical | |||
|
Weak Sudo Configuration CVE-2025-32980 Related Product(s): nGeniusONE CVSS Score: 9.80 First Published: Summary NETSCOUT nGeniusONE before 6.4.0 P11 b3245 has a Weak Sudo Configuration. We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com. Fixed Software Customers should install build 6.4.0 P11 b3245 or later to eliminate this vulnerability. The build is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note that all future versions will include this fix. |
||||||
| CVE-2023-41905 | Reflected Cross-Site Scripting (XSS) | nGeniusONE | Medium | |||
|
Reflected Cross-Site Scripting (XSS) CVE-2023-41905 Related Product(s): nGeniusONE First Published: SummaryNETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Reflected Cross-Site scripting vulnerability. NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com. Fixed SoftwareCustomers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix. |
||||||
| CVE-2023-41172 | Stored Cross-Site Scripting (XSS) | nGeniusONE | Medium | |||
|
Stored Cross-Site Scripting (XSS) CVE-2023-41172 Related Product(s): nGeniusONE First Published: SummaryNETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability. NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com. Fixed SoftwareCustomers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix. |
||||||
| CVE-2023-41171 | Stored Cross-Site Scripting (XSS) | nGeniusONE | Medium | |||
|
Stored Cross-Site Scripting (XSS) CVE-2023-41171 Related Product(s): nGeniusONE First Published: SummaryNETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability. NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com. Fixed SoftwareCustomers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix. |
||||||
| CVE-2023-41170 | Stored Cross-Site Scripting (XSS) | nGeniusONE | Medium | |||
|
Stored Cross-Site Scripting (XSS) CVE-2023-41170 Related Product(s): nGeniusONE First Published: SummaryNETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability. NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com. Fixed SoftwareCustomers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix. |
||||||
| CVE-2023-41169 | Stored Cross-Site Scripting (XSS) | nGeniusONE | Medium | |||
|
Stored Cross-Site Scripting (XSS) CVE-2023-41169 Related Product(s): nGeniusONE First Published: SummaryNETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability. NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com. Fixed SoftwareCustomers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix. |
||||||
| CVE-2023-41168 | Stored Cross-Site Scripting (XSS) | nGeniusONE | Medium | |||
|
Stored Cross-Site Scripting (XSS) CVE-2023-41168 Related Product(s): nGeniusONE First Published: SummaryNETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability. NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com. Fixed SoftwareCustomers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix. |
||||||
| CVE-2023-40302 | Weak File Permissions | nGeniusPULSE | Critical | |||
|
Weak File Permissions CVE-2023-40302 Related Product(s): nGeniusPULSE First Published: SummaryNETSCOUT Systems in nGeniusPULSE version 3.8.0-0.2349.0.allows a Weak File Permissions vulnerability. NetScout Systems would like to acknowledge Waeytens Filip and Christophe Schleypen at NCIA for reporting CVE-2023-40301 to techsupport@netscout.com. Fixed SoftwareCustomers should install version 3.11.0-0.397.0 or above to eliminate this vulnerability. The release is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix. |
||||||
| CVE-2023-40301 | Command Injection | nGeniusPULSE | Critical | |||
|
Command Injection CVE-2023-40301 Related Product(s): nGeniusPULSE First Published: SummaryNETSCOUT Systems in nGeniusPULSE version 3.8.0-0.2349.0.allows a Command Injection vulnerability. NetScout Systems would like to acknowledge Waeytens Filip and Christophe Schleypen at NCIA for reporting CVE-2023-40301 to techsupport@netscout.com. Fixed SoftwareCustomers should install version 3.11.0-0.397.0 or above to eliminate this vulnerability. The release is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix. |
||||||
| CVE-2023-40300 | Hardcoded Cryptographic Key | nGeniusPULSE | Critical | |||
|
Hardcoded Cryptographic Key CVE-2023-40300 Related Product(s): nGeniusPULSE First Published: SummaryNETSCOUT Systems in nGeniusPULSE version 3.8.0-0.2349.0.allows a Hardcoded Cryptographic Key vulnerability. NetScout Systems would like to acknowledge Waeytens Filip and Christophe Schleypen at NCIA for reporting CVE-2023-40301 to techsupport@netscout.com. Fixed SoftwareCustomers should install version 3.11.0-0.397.0 or above to eliminate this vulnerability. The release is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix. |
||||||