<?xml version="1.0" encoding="UTF-8"?><feed xmlns="http://www.w3.org/2005/Atom">
  <title>IACBOX Security Advisories</title>
  <id>https://www.iacbox.com/en/knowledge/security-advisories/</id>
  <updated>2026-04-08T15:00:00Z</updated>
  <subtitle>Get the latest security advisories for IACBOX</subtitle>
  <link href="https://www.iacbox.com/en/knowledge/security-advisories/"></link>
  <author>
    <name>iacbox.com</name>
    <email>support@iacbox.com</email>
  </author>
  <entry>
    <title>IAC-2026-006 Two vulnerabilities in PHP dependencies</title>
    <updated>2026-04-08T15:00:00Z</updated>
    <id>tag:www.iacbox.com,2026-04-08:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2026-006 - Two vulnerabilities in PHP dependencies&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2026-04-08 15:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2026-04-08 15:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 24.0.0&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 24.2.2&lt;/li&gt;&lt;li&gt;Version with Fix: 24.2.3&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;There have been two vulnerabilities in PHP dependencies found.&lt;/p&gt; &lt;p&gt; &lt;b&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2026-4587&#34;&gt;CVE-2026-4587&lt;/a&gt;&lt;/b&gt;: Affects the composer package &lt;tt&gt;hybridauth/hybridauth&lt;/tt&gt;. A vulnerability was found in HybridAuth up to &lt;tt&gt;3.12.2&lt;/tt&gt;. This issue affects some unknown processing of the file src/HttpClient/Curl.php of the component SSL Handler. The manipulation of the argument curlOptions results in improper certificate validation. The attack can be launched remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. &lt;/p&gt; &lt;p&gt; &lt;b&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2025-64500&#34;&gt;CVE-2025-64500&lt;/a&gt;&lt;/b&gt;: The composer package &lt;tt&gt;symfony/http&lt;/tt&gt; did not handle paths safely. This vulnerability is rated as HIGH, but as the IACBOX does not use this package for authentication/authorization we&#39;re not affected directly. To avoid possible unknown issues with this in third party libs, this package is updated to a safe version. &lt;/p&gt; &lt;p&gt; &lt;b&gt;Update recommendation&lt;/b&gt;&lt;br&gt; The affected composer packages have been updated. Updating the IACBOX to this version is recommended for users of any &lt;b&gt;OAuth2 authentication&lt;/b&gt; like the Social logins and Microsoft Entry ID (Azure AD). &lt;/p&gt; </content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2026-006" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2026-005 openssl 3.5.x vulnerabilities</title>
    <updated>2026-03-09T10:00:00Z</updated>
    <id>tag:www.iacbox.com,2026-03-09:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2026-005 - openssl 3.5.x vulnerabilities&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2026-03-09 10:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2026-03-09 10:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: not_affected&lt;/li&gt;&lt;li&gt;Affected version from (incl.): &lt;/li&gt;&lt;li&gt;Affected version to (incl.): &lt;/li&gt;&lt;li&gt;Version with Fix: 24.2.2&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;There are two vulnerabilities in openssl 3.5.x. This update delivers openssl 3.5.5, which contains the fixes for these vulnerabilities.&lt;/p&gt;&lt;p&gt;CVE-2025-11187: Improper validation of PBMAC1 parameters in PKCS#12 MAC verification. Currently certificates are only supported in PKCS#1/8 format, so this vulnerability does not affect normal IACBOX operation.&lt;br&gt;CVE-2025-15467: Stack buffer overflow in CMS (Auth)EnvelopedData parsing could theoretically be used for DoS attacks, so this vulnerability is rated as &lt;b&gt;High&lt;/b&gt; by openssl. But as CMS is not used on the IACBOX, this code is never reached.&lt;/p&gt;&lt;br&gt;&lt;a target=&#34;_blank&#34; href=&#34;https://openssl-library.org/news/vulnerabilities/#CVE-2025-11187&#34;&gt;More details on CVE-2025-11187&lt;/a&gt;&lt;br&gt;&lt;a target=&#34;_blank&#34; href=&#34;https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467&#34;&gt;More details on CVE-2025-15467&lt;/a&gt;&lt;br&gt;&lt;br&gt;openssl is updated anyway to the latest version with &lt;tt&gt;24.2.2&lt;/tt&gt;.</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2026-005" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2026-004 Two vulnerabilities in go</title>
    <updated>2026-03-09T10:00:00Z</updated>
    <id>tag:www.iacbox.com,2026-03-09:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2026-004 - Two vulnerabilities in go&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2026-03-09 10:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2026-03-09 10:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: low&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 24.0.0&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 24.2.1&lt;/li&gt;&lt;li&gt;Version with Fix: 24.2.2&lt;/li&gt;&lt;/ul&gt;There are two vulnerabilities in the Go standard library up to &lt;tt&gt;go 1.25.6&lt;/tt&gt;. To our knowledge, these vulnerabilities do not affect our go code,but may occur in depencencies of the go libs. This update delivers go binaries compiled with &lt;tt&gt;go 1.25.7&lt;/tt&gt;.&lt;p&gt;CVE-2025-68121: crypto/tls: Fixes a possible validation bypass if third-party libs manipulate the TLS config.&lt;br&gt;CVE-2025-61732: This vulnerability affects only the go toolchain and is not relevant for the IACBOX itself.&lt;/p&gt;&lt;p&gt;Find all details on the &lt;a href=&#34;https://groups.google.com/g/golang-announce/c/K09ubi9FQFk&#34;&gt;Go Security Advisory&lt;/a&gt;&lt;br&gt;&lt;/p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2026-004" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2026-003 Multiple vulnerabilities in go</title>
    <updated>2026-01-29T13:00:00Z</updated>
    <id>tag:www.iacbox.com,2026-01-29:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2026-003 - Multiple vulnerabilities in go&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2026-01-29 13:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2026-01-29 13:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 24.0.0&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 24.1.x&lt;/li&gt;&lt;li&gt;Version with Fix: 24.2.0&lt;/li&gt;&lt;/ul&gt;There are multiple vulnerabilities in the Go standard library that could lead to Denial of Service (DoS) attacks or information leaks.There is no high risk for normal IACBOX operation.&lt;p&gt;CVE-2025-61728: archive/zip: Potential DoS attack when unpacking a malicious archive.&lt;br&gt;CVE-2025-61726: net/http: Potential DoS attack due to memory exhaustion on malicious URLs.&lt;br&gt;CVE-2025-68121: crypto/tls: Potential bypass a check of the full TLS certificate chain.&lt;br&gt;CVE-2025-61730: crypto/tls: Potential minor information leakage during TLS handshake.&lt;br&gt;CVE-2025-61731, CVE-2025-68119: This vulnerabilities affect only the go toolchain.&lt;/p&gt;&lt;p&gt;Find all details on the &lt;a href=&#34;https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc&#34;&gt;Go Security Advisory&lt;/a&gt;&lt;br&gt;&lt;/p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2026-003" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2026-002 Multiple vulnerabilities in PHP</title>
    <updated>2026-01-29T13:00:00Z</updated>
    <id>tag:www.iacbox.com,2026-01-29:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2026-002 - Multiple vulnerabilities in PHP&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2026-01-29 13:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2026-01-29 13:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 24.0.0&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 24.1.x&lt;/li&gt;&lt;li&gt;Version with Fix: 24.2.0&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href=&#34;https://github.com/php/php-src/security/advisories/GHSA-8xr5-qppj-gvwj&#34;&gt;GHSA-8xr5-qppj-gvwj&lt;/a&gt;&lt;br&gt;NULL Pointer Dereference in PDO quoting - could lead to DoS attacks&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://github.com/php/php-src/security/advisories/GHSA-3237-qqm7-mfv7&#34;&gt;GHSA-3237-qqm7-mfv7&lt;/a&gt;&lt;br&gt;Information Leak of Memory&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://github.com/php/php-src/security/advisories/GHSA-h96m-rvf9-jgm2&#34;&gt;GHSA-h96m-rvf9-jgm2&lt;/a&gt;&lt;br&gt;Heap buffer overflow in array_merge() - could lead to DoS attacks with crafted input&lt;/p&gt;&lt;p&gt;We recommend upgrading to the latest IACBOX version &lt;tt&gt;24.2.0&lt;/tt&gt; to mitigate these vulnerabilities.&lt;/p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2026-002" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2026-001 zlib / untgz vulnerability</title>
    <updated>2026-01-09T09:00:00Z</updated>
    <id>tag:www.iacbox.com,2026-01-09:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2026-001 - zlib / untgz vulnerability&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2026-01-09 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2026-01-09 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: not_affected&lt;/li&gt;&lt;li&gt;Affected version from (incl.): &lt;/li&gt;&lt;li&gt;Affected version to (incl.): &lt;/li&gt;&lt;li&gt;Version with Fix: &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The optional command line utility &lt;tt&gt;untgz&lt;/tt&gt; has a critical vulnerability that allows an attacker to execute arbitrary code on the system. This vulnerability is due to a buffer overflow in the &lt;tt&gt;untgz&lt;/tt&gt; utility.&lt;p&gt;The IACBOX is not affected, because &lt;tt&gt;untgz&lt;/tt&gt; is not installed, only &lt;tt&gt;zlib&lt;/tt&gt; is installed, which does not have this vulnerability.&lt;p&gt;&lt;br&gt;&lt;a href=&#34;https://euvd.enisa.europa.eu/vulnerability/CVE-2026-22184&#34;&gt;See external page for more details&lt;/a&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2026-001" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2025-008 go-lang security vulnerabilities</title>
    <updated>2025-10-06T09:00:00Z</updated>
    <id>tag:www.iacbox.com,2025-10-06:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2025-008 - go-lang security vulnerabilities&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2025-10-06 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2025-10-06 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 24.0.0&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 24.0.11&lt;/li&gt;&lt;li&gt;Version with Fix: 24.1.0&lt;/li&gt;&lt;/ul&gt;The go standard library is vulnerable to this security vulnerabilities:&lt;br&gt;&lt;p&gt;&lt;h3&gt;EUVD-2025-30195, CVE-2025-47906&lt;/h3&gt;If the PATH environment variable contains paths which are executables (rather than just directories),passing certain strings to LookPath (&#34;&#34;, &#34;.&#34;, and &#34;..&#34;), can result in the binaries listed in the PATH being unexpectedly returned.&lt;/p&gt;&lt;p&gt;&lt;h3&gt;EUVD-2025-23921, CVE-2025-47907&lt;/h3&gt;Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of thereturned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race conditionthat may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected resultsfrom the other query or an error.&lt;/p&gt;&lt;p&gt;The go version was updated to &lt;tt&gt;1.25.1&lt;/tt&gt; and all affected go binaries were recompiled.&lt;/p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2025-008" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2025-007 openssl 3.1 End Of Life</title>
    <updated>2025-10-06T09:00:00Z</updated>
    <id>tag:www.iacbox.com,2025-10-06:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2025-007 - openssl 3.1 End Of Life&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2025-10-06 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2025-10-06 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 24.0.0&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 24.0.11&lt;/li&gt;&lt;li&gt;Version with Fix: 24.1.0&lt;/li&gt;&lt;/ul&gt;IACBOX version 24 used &lt;b&gt;openssl 3.1&lt;/b&gt; which is End Of Life.&lt;br&gt;The update to IACBOX 24.1.0 updates openssl to version 3.5.x which is the latest LTS version with updates till 2030.&lt;br&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2025-007" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2025-006 Possible SQL injection via pgsql extension</title>
    <updated>2025-07-14T12:00:00Z</updated>
    <id>tag:www.iacbox.com,2025-07-14:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2025-006 - Possible SQL injection via pgsql extension&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2025-07-14 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2025-07-14 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 24.0.0&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 24.0.8&lt;/li&gt;&lt;li&gt;Version with Fix: 24.0.9&lt;/li&gt;&lt;/ul&gt;Missing error checking could result in SQL injection and missing error handling could lead to crashes due to null pointer dereferences.&lt;p&gt;&lt;b&gt;Further Information&lt;/b&gt;&lt;br&gt;&lt;a href=&#34;https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3&#34; target=&#34;_blank&#34;&gt;https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3&lt;/a&gt;&lt;br&gt;&lt;/p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2025-006" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2025-005 sudo Vulnerability</title>
    <updated>2025-07-02T08:00:00Z</updated>
    <id>tag:www.iacbox.com,2025-07-02:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2025-005 - sudo Vulnerability&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2025-07-02 08:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2025-07-02 08:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: not_affected&lt;/li&gt;&lt;li&gt;Affected version from (incl.): &lt;/li&gt;&lt;li&gt;Affected version to (incl.): &lt;/li&gt;&lt;li&gt;Version with Fix: &lt;/li&gt;&lt;/ul&gt;The IACBOX is not affected by the &lt;tt&gt;sudo&lt;/tt&gt; vulnerability, as none of our versions ever had &#34;sudo&#34; installed.</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2025-005" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2025-004 Vulnerability in PostgreSQL</title>
    <updated>2025-05-22T12:00:00Z</updated>
    <id>tag:www.iacbox.com,2025-05-22:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2025-004 - Vulnerability in PostgreSQL&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2025-05-22 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2025-05-22 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 24.0.0&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 24.0.6&lt;/li&gt;&lt;li&gt;Version with Fix: 24.0.7&lt;/li&gt;&lt;/ul&gt;A vulnerability in PostgreSQL allowing to inject malicious SQL queries as well as local code execution via interactive psql tool.&lt;p&gt;&lt;b&gt;Further Information&lt;/b&gt;&lt;br&gt;&lt;a href=&#34;https://ubuntu.com/security/CVE-2025-1094&#34; target=&#34;_blank&#34;&gt;https://ubuntu.com/security/CVE-2025-1094&lt;/a&gt;&lt;br&gt;&lt;a href=&#34;https://www.rapid7.com/blog/post/2025/02/13/cve-2025-1094-postgresql-psql-sql-injection-fixed/&#34; target=&#34;_blank&#34;&gt;https://www.rapid7.com/blog/post/2025/02/13/cve-2025-1094-postgresql-psql-sql-injection-fixed/&lt;/a&gt;&lt;/p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2025-004" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2025-003 Vulnerabilities in xz/liblzma</title>
    <updated>2025-05-13T12:00:00Z</updated>
    <id>tag:www.iacbox.com,2025-05-13:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2025-003 - Vulnerabilities in xz/liblzma&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2025-05-13 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2025-05-13 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 24.0.0&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 24.0.5&lt;/li&gt;&lt;li&gt;Version with Fix: 24.0.6&lt;/li&gt;&lt;/ul&gt;A vulnerability in xz/liblzma can lead to a crash if an invalid/manipulated xz archive gets decoded.&lt;p&gt;For all details please visit: &lt;a href=&#34;https://tukaani.org/xz/threaded-decoder-early-free.html&#34; target=&#34;_blank&#34;&gt;https://tukaani.org/xz/threaded-decoder-early-free.html&lt;/a&gt;&lt;/p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2025-003" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2025-002 Multiple vulnerabilities in openssl</title>
    <updated>2025-05-13T12:00:00Z</updated>
    <id>tag:www.iacbox.com,2025-05-13:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2025-002 - Multiple vulnerabilities in openssl&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2025-05-13 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2025-05-13 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: low&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 24.0.0&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 24.0.5&lt;/li&gt;&lt;li&gt;Version with Fix: 24.0.6&lt;/li&gt;&lt;/ul&gt;Multiple vulnerabilities have been found in openssl:&lt;p&gt;- Fixed timing side-channel in ECDSA signature computation. (CVE-2024-13176)- Fixed possible OOB memory access with invalid low-level GF(2^m) elliptic curve parameters. (CVE-2024-9143)&lt;/p&gt;This bugs are not critical for the system and have a low severity.&lt;p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2025-002" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2025-001 Multiple vulnerabilities in rsync</title>
    <updated>2025-01-22T09:00:00Z</updated>
    <id>tag:www.iacbox.com,2025-01-22:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2025-001 - Multiple vulnerabilities in rsync&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2025-01-16 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2025-01-22 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 21.0-p21004, 24.0.0&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 21.0-p21592, 24.0.1&lt;/li&gt;&lt;li&gt;Version with Fix: 21.0-p21595, 24.0.2&lt;/li&gt;&lt;/ul&gt;Multiple vulnerabilities have been found in rsync, but most of them affect only the rsync daemon, which is not in use on the IACBOX.&lt;br&gt;But the rsync client is also affected if connected to unknown servers that are maybe controlled by an attacker.&lt;p&gt;&lt;b&gt;Which versions are affected?&lt;/b&gt;&lt;br&gt;&lt;p&gt;&lt;b&gt;All versions up to v21&lt;/b&gt; are affected as they are using rsync. The impact is rated only as MEDIUM as an IACBOX is only connecting to Asteas controlled update servers, so there is no real attack surface, except for a possible local exploitation.&lt;br&gt;The rsync package is updated anyway to eliminate any possibly left over risk.&lt;br&gt;This issue is fixed with the current version &lt;tt&gt;21.0-p21595&lt;/tt&gt;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Version 24&lt;/b&gt; is not using rsync anymore, but as the binary is installed it get&#39;s updated to the latest rsync version &lt;tt&gt;3.4.1&lt;/tt&gt; too.&lt;br&gt;The new rsync version is shipped with version &lt;tt&gt;24.0.2&lt;/tt&gt;, released on 22 Jan 2025.&lt;/p&gt;&lt;p&gt;For all details please visit: &lt;a href=&#34;https://kb.cert.org/vuls/id/952657&#34; target=&#34;_blank&#34;&gt;https://kb.cert.org/vuls/id/952657&lt;/a&gt;&lt;/p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2025-001" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2024-008 CUPS vulnerability</title>
    <updated>2024-09-30T09:00:00Z</updated>
    <id>tag:www.iacbox.com,2024-09-30:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2024-008 - CUPS vulnerability&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2024-09-30 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2024-09-30 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: not_affected&lt;/li&gt;&lt;li&gt;Affected version from (incl.): &lt;/li&gt;&lt;li&gt;Affected version to (incl.): &lt;/li&gt;&lt;li&gt;Version with Fix: &lt;/li&gt;&lt;/ul&gt;The IACBOX does not use &lt;b&gt;CUPS&lt;/b&gt; and is not affected.</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2024-008" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2024-007 Webserver source code disclosure (part 2)</title>
    <updated>2024-09-09T12:00:00Z</updated>
    <id>tag:www.iacbox.com,2024-09-09:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2024-007 - Webserver source code disclosure (part 2)&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2024-09-09 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2024-09-09 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 21.0-p21004&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 21.0-p21569&lt;/li&gt;&lt;li&gt;Version with Fix: 21.0-p21573&lt;/li&gt;&lt;/ul&gt;The webserver shipped with an IACBOX (apache) had a source code disclosure vulnerability in version &lt;tt&gt;2.4.60&lt;/tt&gt;.&lt;br&gt;This was only partially fixed with version &lt;tt&gt;2.4.61&lt;/tt&gt; that has already been shipped with IACBOX version &lt;tt&gt;21.0-p21566&lt;/tt&gt;.&lt;br&gt;We have not been able to trigger this vulnerability anymore, but to be safe, we advise you to update to the latest version &lt;tt&gt;21.0-p21573&lt;/tt&gt;&lt;p&gt;&lt;a href=&#34;https://downloads.apache.org/httpd/CHANGES_2.4.62&#34;&gt;See the apache changelog for details&lt;/a&gt;&lt;/p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2024-007" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2024-006 Radius vulnerability</title>
    <updated>2024-07-15T12:00:00Z</updated>
    <id>tag:www.iacbox.com,2024-07-15:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2024-006 - Radius vulnerability&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2024-07-15 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2024-07-15 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 21.0-p21004&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 21.0-p21561&lt;/li&gt;&lt;li&gt;Version with Fix: 21.0-p21566&lt;/li&gt;&lt;/ul&gt;The discovered &lt;b&gt;vulenerability in the RADIUS protocol&lt;/b&gt; called &lt;i&gt;Blast-RADIUS&lt;/i&gt; affects Radius and iPass authentication on the IACBOX.&lt;p&gt;&lt;b&gt;Who is affected?&lt;/b&gt;&lt;br&gt;Only systems with activated external authentication method &lt;b&gt;Radius&lt;/b&gt; or &lt;b&gt;iPass&lt;/b&gt; are affected as plain Radius (without EAP) is in use.&lt;br&gt;- Note that Radius can also be used as authentication method for WebAdmin logins which is also affected.&lt;br&gt;- Radius as part of &lt;b&gt;802.1x&lt;/b&gt; is &lt;b&gt;not affected&lt;/b&gt; as EAP should always be in use there.&lt;/p&gt;&lt;p&gt;There&#39;s a possible MITM attack that can change a denied authentication into a successful authentication.&lt;br&gt;The attacker needs to craft a matching MD5-HMAC within the clients timeout, so this needs resources and time, so this is not easy to exploit.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Changes&lt;/b&gt;&lt;br&gt;- From now on Radius requests always have the &lt;tt&gt;Message-Authenticator&lt;/tt&gt; attribute set&lt;br&gt;- There&#39;s a new Radius setting in WebAdmin under Login Methods -&gt; External Authentication -&gt; Radius: &lt;b&gt;Force Message Authentication&lt;/b&gt;which checks if a Radius response has the attribute &lt;tt&gt;Message-Authenticator&lt;/tt&gt;.&lt;br&gt;&lt;b&gt;This new option has to be switched on manually&lt;/b&gt; as it&#39;s maybe not backwards compatible with your Radius server that does not send this attribute.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Further Information&lt;/b&gt;&lt;br&gt;&lt;a href=&#34;https://www.blastradius.fail/&#34;&gt;See the blastradius.fail page for more details&lt;/a&gt;&lt;/p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2024-006" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2024-005 Multiple webserver vulnerabilities</title>
    <updated>2024-07-15T12:00:00Z</updated>
    <id>tag:www.iacbox.com,2024-07-15:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2024-005 - Multiple webserver vulnerabilities&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2024-07-15 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2024-07-15 12:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: high&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 21.0-p21004&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 21.0-p21561&lt;/li&gt;&lt;li&gt;Version with Fix: 21.0-p21566&lt;/li&gt;&lt;/ul&gt;The webserver shipped with an IACBOX (apache) has multiple vulnerabilities which have been fixed with httpd version&lt;tt&gt;2.4.60&lt;/tt&gt; and &lt;tt&gt;2.4.61&lt;/tt&gt;.&lt;br&gt;As some of the vulnerabilities allow DoS attacks, all users are advised to update their systems to &lt;tt&gt;21.0-p21566&lt;/tt&gt;.&lt;br&gt;&lt;p&gt;&lt;a href=&#34;https://downloads.apache.org/httpd/CHANGES_2.4&#34;&gt;See the apache changelog for details&lt;/a&gt;&lt;/p&gt;</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2024-005" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2024-004 OpenSSH regreSSHion vulnerability</title>
    <updated>2024-07-03T08:30:00Z</updated>
    <id>tag:www.iacbox.com,2024-07-03:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2024-004 - OpenSSH regreSSHion vulnerability&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2024-07-03 08:30:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2024-07-03 08:30:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: high&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 21.0-p21004&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 21.0-p21556&lt;/li&gt;&lt;li&gt;Version with Fix: 21.0-p21561&lt;/li&gt;&lt;/ul&gt;OpenSSH has a serious remote code execution vulnerability which gets fixed with 21.0-p21561.&lt;br&gt;&lt;a target=&#34;_blank&#34; href=&#34;https://www.qualys.com/regresshion-cve-2024-6387&#34;&gt;See all details in the Qualys report (regreSSHion)&lt;/a&gt;&lt;br&gt;&lt;b&gt;Workaround for systems that can&#39;t be updated right now:&lt;/b&gt; Disable SSH access from all interfaces or add rules to your firewall so that SSH port (TCP/22) is not reachable.</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2024-004" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2024-003 Linux kernel vulnerability</title>
    <updated>2024-04-17T09:00:00Z</updated>
    <id>tag:www.iacbox.com,2024-04-17:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2024-003 - Linux kernel vulnerability&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2024-04-12 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2024-04-17 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: high&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 21.0-p21004&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 21.0-p21530&lt;/li&gt;&lt;li&gt;Version with Fix: 21.0-p21543&lt;/li&gt;&lt;/ul&gt;There&#39;s a possible local priviledge escalation in the Linux kernel GSM module. Also if the module is not used it can be loaded and exploited&lt;br&gt;&lt;b&gt;UPDATE:&lt;/b&gt; Patchlevel update &lt;tt&gt;21.0-p21543&lt;/tt&gt; replaces update &lt;tt&gt;21.0-p21536&lt;/tt&gt; which provided a workaround for this issue.</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2024-003" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2024-002 liblzma/xz/sshd vulnerability</title>
    <updated>2024-03-31T09:00:00Z</updated>
    <id>tag:www.iacbox.com,2024-03-31:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2024-002 - liblzma/xz/sshd vulnerability&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2024-03-31 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2024-03-31 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: not_affected&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 21.0-p21004&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 21.0-p21004&lt;/li&gt;&lt;li&gt;Version with Fix: 21.0-p21004&lt;/li&gt;&lt;/ul&gt;The IACBOX is not affected as the used liblzma version does not contain this vulnerability.</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2024-002" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
  <entry>
    <title>IAC-2024-001 OpenSSH vulnerability</title>
    <updated>2024-02-01T09:00:00Z</updated>
    <id>tag:www.iacbox.com,2024-02-01:/en/knowledge/security-advisories/</id>
    <content type="html">&lt;h2&gt;IAC-2024-001 - OpenSSH vulnerability&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Released: 2024-02-01 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Updated: 2024-02-01 09:00:00 +0000 +0000&lt;/li&gt;&lt;li&gt;Severity: medium&lt;/li&gt;&lt;li&gt;Affected version from (incl.): 21.0-p21004&lt;/li&gt;&lt;li&gt;Affected version to (incl.): 21.0-p21510&lt;/li&gt;&lt;li&gt;Version with Fix: 21.0-p21518&lt;/li&gt;&lt;/ul&gt;An OpenSSH connection can be downgraded during handshake (Terrapin attack). As SSH is only rarely used for remote control connections this does not really affect normal operation.</content>
    <link href="https://www.iacbox.com/en/knowledge/security-advisories/?id=IAC-2024-001" rel="alternate"></link>
    <author>
      <name>iacbox.com</name>
      <email>support@iacbox.com</email>
    </author>
  </entry>
</feed>