Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security Report on Vulnerabilities Identified Through Prisma Scan. #64

Open
aashiinmayo opened this issue Jul 23, 2024 · 0 comments
Open

Comments

@aashiinmayo
Copy link

1. Introduction
This report summarizes the vulnerabilities identified through the Prisma scan conducted.
The identified vulnerabilities have been categorized based on their severity levels, potential impacts, and recommended actions for remediation.

2. Vulnerabilities

2.1 Critical Vulnerabilities:
Vulnerability: CVE-2020-29652
Description: A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.

2.2 High Vulnerabilities:
Vulnerability: CVE-2023-44487
Description: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

3. How to reproduce it (as minimally and precisely as possible):
Scan your image via Prisma and you will see the issues.
See screenshot for more details

4. Conclusion
The Prisma scan identified several vulnerabilities in the environment.
Immediate attention should be given to critical and high-severity vulnerabilities to mitigate potential risks.
Medium and low-severity vulnerabilities should also be addressed in a timely manner to strengthen the security posture.
Continuous monitoring and regular vulnerability assessments are recommended to ensure ongoing security.

Please review this report and prioritize the remediation efforts accordingly.

image
Screenshot from 2024-07-23 15-51-05
Screenshot from 2024-07-23 15-52-06

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant