Advisory ID |
CVE Record |
ICSA Record |
Affected Product |
Summary |
Published |
Updated |
---|---|---|---|---|---|---|
CVE-2024-8525
|
ICSA-24-326-01 |
Automated Logic WebCTRL & Carrier i-Vu |
Unrestricted File Upload and Open Redirect vulnerabilities |
November 21, 2024 |
November 21, 2024 |
|
CVE-2023-5222
|
Viessmann Vitogate 300 |
Viessmann Vitogate 300 vulnerabilities |
September 10, 2024 |
September 10, 2024 |
||
Not Applicable |
Not Applicable |
Carrier Global Product Security Advisory |
Progress Software MOVEit vulnerabilities |
June 26, 2023 |
June 26, 2023 |
|
Not Applicable |
Not Applicable |
Carrier Global Product Security Advisory |
Apache Shiro authentication bypass vulnerabilities |
Jan 20, 2023 |
Jan 20, 2023 |
|
Not Applicable |
Not Applicable |
Carrier Global Product Security Advisory |
OpenSSL 3.0 vulnerabilities |
Nov 4, 2022 |
Nov 4, 2022 |
|
Not Applicable |
Not Applicable |
Carrier Global Product Security Advisory |
Text4Shell Remote code execution vulnerability |
Nov 4, 2022 |
Dec 16, 2022 |
|
Not Applicable |
Not Applicable |
Carrier Global Product Security Advisory |
Spring4Shell Remote code execution vulnerability |
April 7, 2022 |
April 7, 2022 |
|
Not Applicable |
Not Applicable |
Carrier Global Product Security Advisory |
Okta - Lapsus$ Compromise summary |
March 30, 2022 |
April 7, 2022 |
|
Not Applicable |
Not Applicable |
Carrier Global Product Security Advisory |
Log4j Remote code execution vulnerabilities |
Dec 20, 2021 |
Jan 20, 2022 |
|
CVE-2022-1318
|
ICSA-22-109-01 |
Hills ComNav |
Weak authentication and communication channel vulnerabilities |
Nov 1, 2021 |
April 19, 2022 |
|
CVE-2022-1019 |
ICSA-22-109-02 |
Automated Logic WebCTRL & Carrier i-Vu |
Open redirect vulnerability |
Nov 1, 2021 |
April 19, 2022 |
PRODUCT SECURITY ADVISORIES
Carrier endeavors to ensure that validation, analysis, and mitigation of findings are proactively communicated in a responsible manner.
The Carrier PSIRT Plan prepares and discloses product security advisory publications to acknowledge the reporters, vulnerabilities, impacts, and mitigations of the reported incidents.