{"id":10336,"date":"2024-09-25T12:02:21","date_gmt":"2024-09-25T10:02:21","guid":{"rendered":"https:\/\/www.idisglobal.solutions\/?page_id=10336"},"modified":"2024-10-03T12:19:19","modified_gmt":"2024-10-03T10:19:19","slug":"kennisgeving-kwetsbaarheid","status":"publish","type":"page","link":"https:\/\/www.idisglobal.solutions\/en\/supp\/kennisgeving-kwetsbaarheid\/","title":{"rendered":"Vulnerability Notice"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none nonhundred-percent-fullwidth hundred-percent-height hundred-percent-height-center-content non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:-100px;--awb-background-color:#0e1f2e;--awb-background-image:url(&quot;https:\/\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/bg_cybersecurity.jpg&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-align-content-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:150px;margin-bottom:100px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-text-transform:none;\"><p style=\"text-align: center;\"><strong><span style=\"text-align: center; color: #ffffff; font-size: 60px;\">Cybersecurity<\/span><\/strong><\/p>\n<h4 class=\"fusion-responsive-typography-calculated\" style=\"text-align: center; font-weight: 400; --fontsize: 24; line-height: 1.5;\" data-fontsize=\"24\" data-lineheight=\"36px\"><strong><span style=\"color: #ffffff;\">Vulnerability Management<\/span><\/strong><\/h4>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">IDIS takes a thorough and transparent approach to managing and responding to vulnerabilities in our products and services, minimizing potential risks for our customers.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:-65px;--awb-background-color:#ffffff29;--awb-flex-wrap:nowrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-align-content-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 awb-sticky awb-sticky-small awb-sticky-medium awb-sticky-large fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-between fusion-content-layout-row fusion-flex-align-items-center fusion-content-nowrap\"><nav class=\"awb-menu awb-menu_row awb-menu_em-hover mobile-mode-collapse-to-button awb-menu_icons-left awb-menu_dc-yes mobile-trigger-fullwidth-off awb-menu_mobile-toggle awb-menu_indent-left mobile-size-full-absolute loading mega-menu-loading awb-menu_desktop awb-menu_dropdown awb-menu_expand-right awb-menu_transition-fade\" style=\"--awb-justify-content:space-between;--awb-items-padding-right:5%;--awb-items-padding-left:5%;--awb-border-color:#00a0af;--awb-border-bottom:4px;--awb-color:#ffffff;--awb-active-color:#ffffff;--awb-main-justify-content:flex-start;--awb-mobile-justify:flex-start;--awb-mobile-caret-left:auto;--awb-mobile-caret-right:0;--awb-fusion-font-family-typography:inherit;--awb-fusion-font-style-typography:normal;--awb-fusion-font-weight-typography:400;--awb-fusion-font-family-submenu-typography:inherit;--awb-fusion-font-style-submenu-typography:normal;--awb-fusion-font-weight-submenu-typography:400;--awb-fusion-font-family-mobile-typography:inherit;--awb-fusion-font-style-mobile-typography:normal;--awb-fusion-font-weight-mobile-typography:400;\" aria-label=\"Cybersecurity menu\" data-breakpoint=\"1024\" data-count=\"1\" data-transition-type=\"bottom-vertical\" data-transition-time=\"300\" data-expand=\"right\"><button type=\"button\" class=\"awb-menu__m-toggle awb-menu__m-toggle_no-text\" aria-expanded=\"false\" aria-controls=\"menu-cybersecurity-menu\"><span class=\"awb-menu__m-toggle-inner\"><span class=\"collapsed-nav-text\"><span class=\"screen-reader-text\">Toggle Navigation<\/span><\/span><span class=\"awb-menu__m-collapse-icon awb-menu__m-collapse-icon_no-text\"><span class=\"awb-menu__m-collapse-icon-open awb-menu__m-collapse-icon-open_no-text fa-bars fas\"><\/span><span class=\"awb-menu__m-collapse-icon-close awb-menu__m-collapse-icon-close_no-text fa-times fas\"><\/span><\/span><\/span><\/button><ul id=\"menu-cybersecurity-menu-1\" class=\"fusion-menu awb-menu__main-ul awb-menu__main-ul_row\"><li   class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-10295 awb-menu__li awb-menu__main-li awb-menu__main-li_regular\"  data-item-id=\"10295\"><span class=\"awb-menu__main-background-default awb-menu__main-background-default_bottom-vertical\"><\/span><span class=\"awb-menu__main-background-active awb-menu__main-background-active_bottom-vertical\"><\/span><a  href=\"https:\/\/www.idisglobal.solutions\/en\/supp\/cybersecurity\/\" class=\"awb-menu__main-a awb-menu__main-a_regular\"><span class=\"menu-text\">IDIS Technology<\/span><\/a><\/li><li   class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-10296 awb-menu__li awb-menu__main-li awb-menu__main-li_regular\"  data-item-id=\"10296\"><span class=\"awb-menu__main-background-default awb-menu__main-background-default_bottom-vertical\"><\/span><span class=\"awb-menu__main-background-active awb-menu__main-background-active_bottom-vertical\"><\/span><a  href=\"https:\/\/www.idisglobal.solutions\/en\/supp\/cybersecuritybeleid\/\" class=\"awb-menu__main-a awb-menu__main-a_regular\"><span class=\"menu-text\">Cybersecurity Policy<\/span><\/a><\/li><li   class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-10297 awb-menu__li awb-menu__main-li awb-menu__main-li_regular\"  data-item-id=\"10297\"><span class=\"awb-menu__main-background-default awb-menu__main-background-default_bottom-vertical\"><\/span><span class=\"awb-menu__main-background-active awb-menu__main-background-active_bottom-vertical\"><\/span><a  href=\"https:\/\/www.idisglobal.solutions\/en\/supp\/kennisgeving-kwetsbaarheid\/\" class=\"awb-menu__main-a awb-menu__main-a_regular\"><span class=\"menu-text\">Vulnerability Notice<\/span><\/a><\/li><\/ul><\/nav><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:100px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-space-evenly fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:90px;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:37.5;line-height:1.4;\"><h2 style=\"text-align: center;\">IDIS Vulnerability Notice<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-8\"><p style=\"text-align: center;\">IDIS takes a thorough and transparent approach to managing and responding to<br \/>\nvulnerabilities in our products and services, minimizing potential risks for our customers.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9\"><h4 style=\"text-align: left;\"><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"10337\" data-permalink=\"https:\/\/www.idisglobal.solutions\/en\/supp\/kennisgeving-kwetsbaarheid\/thumb_guide\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png?fit=520%2C340&ssl=1\" data-orig-size=\"520,340\" data-comments-opened=\"0\" data-image-meta=\"\" data-image-title=\"Cybersecurity gidsen\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png?fit=520%2C340&ssl=1\" class=\"alignnone wp-image-10337 size-full\" style=\"border-radius: 14px;\" src=\"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png?resize=520%2C340&#038;ssl=1\" alt=\"\" width=\"520\" height=\"340\" srcset=\"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png?resize=200%2C131&amp;ssl=1 200w, https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png?resize=220%2C144&amp;ssl=1 220w, https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png?resize=300%2C196&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png?resize=400%2C262&amp;ssl=1 400w, https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png?resize=420%2C275&amp;ssl=1 420w, https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png?w=520&amp;ssl=1 520w\" sizes=\"(max-width: 520px) 100vw, 520px\" \/><\/h4>\n<h3>Cybersecurity Guides<\/h3>\n<p>Looking to fortify your data protection environment? IDIS Cybersecurity Guides are here to help. They offer comprehensive advice on creating a more secure infrastructure, providing you with the peace of mind that your data is safeguarded.<\/p>\n<p style=\"text-align: left;\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/SN-7.IDIS_Security_Hardening_Guide_v1.1.1.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><h4 style=\"text-align: left;\"><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"10339\" data-permalink=\"https:\/\/www.idisglobal.solutions\/en\/supp\/kennisgeving-kwetsbaarheid\/thumb_activities\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_activities.png?fit=520%2C340&ssl=1\" data-orig-size=\"520,340\" data-comments-opened=\"0\" data-image-meta=\"\" data-image-title=\"Verbetering cybersecurity\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_activities.png?fit=520%2C340&ssl=1\" class=\"alignnone wp-image-10339 size-full\" style=\"border-radius: 14px;\" src=\"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_activities.png?resize=520%2C340&#038;ssl=1\" alt=\"\" width=\"520\" height=\"340\" srcset=\"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_activities.png?resize=200%2C131&amp;ssl=1 200w, https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_activities.png?resize=220%2C144&amp;ssl=1 220w, https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_activities.png?resize=300%2C196&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_activities.png?resize=400%2C262&amp;ssl=1 400w, https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_activities.png?resize=420%2C275&amp;ssl=1 420w, https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_activities.png?w=520&amp;ssl=1 520w\" sizes=\"(max-width: 520px) 100vw, 520px\" \/><\/h4>\n<h3>Cybersecurity Enhancement Activities<\/h3>\n<p>Discover how IDIS's Cybersecurity Enhancement Activities have successfully managed to mitigate potential cybersecurity risks, securing a safer digital environment for all.<\/p>\n<p style=\"text-align: left;\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-4 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.idisglobal.com\/index\/latest_view\/2959\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Learn More<\/span><\/a><\/div><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:90px;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:37.5;line-height:1.4;\">Vulnerability Report<\/h2><\/div><div class=\"fusion-text fusion-text-11\"><p style=\"text-align: center;\">We are committed to transparency and present you the Vulnerability Report of IDIS&#8217;s products,<br \/>\naddressing both self-tested and user-reported vulnerabilities.<\/p>\n<\/div><div class=\"fusion-widget fusion-widget-element fusion-widget-area fusion-content-widget-area wpWidget-2 catpackages\" style=\"--awb-fusion-border-size:0px;--awb-fusion-border-style:solid;\">            <div class=\"widget widget_catpackages\">            <div class='w3eden'>\n<div class=\"well c2a3\">\n    <div class=\"media\">\n        <div class=\"mr-3\" align=\"left\">\n            <img decoding=\"async\" class=\"wpdm_icon\" alt=\"Icon\"   src=\"https:\/\/www.idisglobal.solutions\/wp-content\/plugins\/download-manager\/assets\/file-type-icons\/pdf.svg\" \/>\n        <\/div>\n        <div class=\"media-body\">\n            <h3 class=\"media-heading\" style=\"padding-top: 0px;border:0px;margin: 0 0px 5px 0;font-size:12pt;\">\n               <strong>VM100017 : IDIS ICM Viewer<\/strong>\n            <\/h3>\n        <\/div>\n        <div class=\"ml-3\" align=\"right\">\n            <a class='wpdm-download-link download-on-click btn btn-primary btn-xs'  rel='nofollow' href='#' data-downloadurl=\"https:\/\/www.idisglobal.solutions\/en\/download\/vm100009-cve-1999-0517-snmpv2-vulnerabilities-2\/?wpdmdl=11814&refresh=69e0efb6e32001776349110\">Download<\/a>\n        <\/div>\n    <\/div>\n<hr class=\"solid\">\n<p>This document provides a technical analysis of the CVE-2025-12556 vulnerability affecting the IDIS ICM Viewer and its impact, as referenced in the Cybersecurity &amp; Infrastructure Security Agency (CISA) ICSA-25-308-05 advisory.<\/p>\n\n<\/div>\n<style>\n    .well.c2a3 .btn {\n        padding: 8px 25px;\n        font-size: 11pt;\n    }\n\n    .well.c2a3 .media-body {\n        font-size: 11pt;\n    }\n\n    .well.c2a3 .wpdm_icon {\n        height: 42px;\n        width: auto;\n\nhr.solid {\n  border-top: 2px solid #eee;\n    }<\/style>\n\n<div class=\"well c2a3\">\n    <div class=\"media\">\n        <div class=\"mr-3\" align=\"left\">\n            <img decoding=\"async\" class=\"wpdm_icon\" alt=\"Icon\"   src=\"https:\/\/www.idisglobal.solutions\/wp-content\/plugins\/download-manager\/assets\/file-type-icons\/pdf.svg\" \/>\n        <\/div>\n        <div class=\"media-body\">\n            <h3 class=\"media-heading\" style=\"padding-top: 0px;border:0px;margin: 0 0px 5px 0;font-size:12pt;\">\n               <strong>VM100009 : CVE-1999-0517 SNMPv2 Vulnerabilities<\/strong>\n            <\/h3>\n        <\/div>\n        <div class=\"ml-3\" align=\"right\">\n            <a class='wpdm-download-link download-on-click btn btn-primary btn-xs'  rel='nofollow' href='#' data-downloadurl=\"https:\/\/www.idisglobal.solutions\/en\/download\/vm100009-cve-1999-0517-snmpv2-vulnerabilities\/?wpdmdl=10346&refresh=69e0efb6e4cdb1776349110\">Download<\/a>\n        <\/div>\n    <\/div>\n<hr class=\"solid\">\n<p>This document provides a brief introduction to the CVE-1999-0517 SNMPv2 vulnerability affecting IDIS IP camera models, and outlines the impact of these attacks on IDIS products.<\/p>\n\n<\/div>\n<style>\n    .well.c2a3 .btn {\n        padding: 8px 25px;\n        font-size: 11pt;\n    }\n\n    .well.c2a3 .media-body {\n        font-size: 11pt;\n    }\n\n    .well.c2a3 .wpdm_icon {\n        height: 42px;\n        width: auto;\n\nhr.solid {\n  border-top: 2px solid #eee;\n    }<\/style>\n\n<div class=\"well c2a3\">\n    <div class=\"media\">\n        <div class=\"mr-3\" align=\"left\">\n            <img decoding=\"async\" class=\"wpdm_icon\" alt=\"Icon\"   src=\"https:\/\/www.idisglobal.solutions\/wp-content\/plugins\/download-manager\/assets\/file-type-icons\/pdf.svg\" \/>\n        <\/div>\n        <div class=\"media-body\">\n            <h3 class=\"media-heading\" style=\"padding-top: 0px;border:0px;margin: 0 0px 5px 0;font-size:12pt;\">\n               <strong>VM-100008 : Log4j Vulnerabilities<\/strong>\n            <\/h3>\n        <\/div>\n        <div class=\"ml-3\" align=\"right\">\n            <a class='wpdm-download-link download-on-click btn btn-primary btn-xs'  rel='nofollow' href='#' data-downloadurl=\"https:\/\/www.idisglobal.solutions\/en\/download\/vm-100008-log4j-vulnerabilities\/?wpdmdl=10345&refresh=69e0efb6e6a891776349110\">Download<\/a>\n        <\/div>\n    <\/div>\n<hr class=\"solid\">\n<p>This document offers a concise overview of the recently issued Apache Log4j vulnerabilities and their impact on IDIS products.<\/p>\n\n<\/div>\n<style>\n    .well.c2a3 .btn {\n        padding: 8px 25px;\n        font-size: 11pt;\n    }\n\n    .well.c2a3 .media-body {\n        font-size: 11pt;\n    }\n\n    .well.c2a3 .wpdm_icon {\n        height: 42px;\n        width: auto;\n\nhr.solid {\n  border-top: 2px solid #eee;\n    }<\/style>\n\n<div class=\"well c2a3\">\n    <div class=\"media\">\n        <div class=\"mr-3\" align=\"left\">\n            <img decoding=\"async\" class=\"wpdm_icon\" alt=\"Icon\"   src=\"https:\/\/www.idisglobal.solutions\/wp-content\/plugins\/download-manager\/assets\/file-type-icons\/pdf.svg\" \/>\n        <\/div>\n        <div class=\"media-body\">\n            <h3 class=\"media-heading\" style=\"padding-top: 0px;border:0px;margin: 0 0px 5px 0;font-size:12pt;\">\n               <strong>VM-100007 : CVE-2021-34527 (Print Nightmare) Vulnerability<\/strong>\n            <\/h3>\n        <\/div>\n        <div class=\"ml-3\" align=\"right\">\n            <a class='wpdm-download-link download-on-click btn btn-primary btn-xs'  rel='nofollow' href='#' data-downloadurl=\"https:\/\/www.idisglobal.solutions\/en\/download\/vm-100007-cve-2021-34527-print-nightmare-vulnerability\/?wpdmdl=10344&refresh=69e0efb6e83661776349110\">Download<\/a>\n        <\/div>\n    <\/div>\n<hr class=\"solid\">\n<p>The CVE-2021-34527 vulnerability, known as 'Print Nightmare,' affecting the Windows spooler service, was disclosed on June 9th, 2021.<br \/>\nThis document offers a concise overview of the 'Print Nightmare' and its implications for IDIS products.<\/p>\n\n<\/div>\n<style>\n    .well.c2a3 .btn {\n        padding: 8px 25px;\n        font-size: 11pt;\n    }\n\n    .well.c2a3 .media-body {\n        font-size: 11pt;\n    }\n\n    .well.c2a3 .wpdm_icon {\n        height: 42px;\n        width: auto;\n\nhr.solid {\n  border-top: 2px solid #eee;\n    }<\/style>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:center bottom;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:150px;--awb-margin-bottom:-90px;--awb-background-color:#f9f9f9;--awb-background-size:1100px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-end fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:90px;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:37.5;line-height:1.4;\"><h2 style=\"text-align: center;\">Report a Vulnerability<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-12\"><p>If you have discovered a new vulnerability in any of our products or services, we encourage you to submit your discovery to <a class=\"securityMail\" href=\"mailto:security@idisglobal.com\" rel=\"noopener noreferrer\">security@idisglobal.com<\/a>. The IDIS Cybersecurity Team will respond to your vulnerability submission within 7 days and aim to assess your report within the same timeframe.<br \/>\nAfter thoroughly reviewing the information you provided, if any vulnerabilities are identified, we will contact you individually with details, and you can also track the progress of your report: <a href=\"https:\/\/www.idisglobal.com\/ticket\">https:\/\/www.idisglobal.com\/ticket<\/a>.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":508,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-10336","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerability Notice<\/title>\n<meta name=\"description\" content=\"(Nederlands) Activiteiten ter verbetering van de cybersecurity van IDIS beperken potenti\u00eble cyberbeveiligingsrisico&#039;s en cre\u00ebren een veiligere digitale omgeving.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Notice\" \/>\n<meta property=\"og:description\" content=\"{:nl}Activiteiten ter verbetering van de cybersecurity van IDIS beperken potenti\u00eble cyberbeveiligingsrisico&#039;s en cre\u00ebren een veiligere digitale omgeving.{:}\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/\" \/>\n<meta property=\"og:site_name\" content=\"IDIS One Solution. One Company.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/idisbenelux\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-03T10:19:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@IDISBenelux\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/kennisgeving-kwetsbaarheid\\\/\",\"url\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/kennisgeving-kwetsbaarheid\\\/\",\"name\":\"Vulnerability Notice\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/kennisgeving-kwetsbaarheid\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/kennisgeving-kwetsbaarheid\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.idisglobal.solutions\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/thumb_guide.png\",\"datePublished\":\"2024-09-25T10:02:21+00:00\",\"dateModified\":\"2024-10-03T10:19:19+00:00\",\"description\":\"{:nl}Activiteiten ter verbetering van de cybersecurity van IDIS beperken potenti\u00eble cyberbeveiligingsrisico's en cre\u00ebren een veiligere digitale omgeving.{:}\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/kennisgeving-kwetsbaarheid\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/kennisgeving-kwetsbaarheid\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/kennisgeving-kwetsbaarheid\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.idisglobal.solutions\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/thumb_guide.png\",\"contentUrl\":\"https:\\\/\\\/www.idisglobal.solutions\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/thumb_guide.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/kennisgeving-kwetsbaarheid\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.idisglobal.solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Support\",\"item\":\"https:\\\/\\\/www.idisglobal.solutions\\\/supp\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Kennisgeving kwetsbaarheid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#website\",\"url\":\"https:\\\/\\\/www.idisglobal.solutions\\\/\",\"name\":\"IDIS One Solution. One Company.\",\"description\":\"Leverancier van IP en HD-TVI camera observatiesystemen.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#organization\"},\"alternateName\":\"IDIS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.idisglobal.solutions\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#organization\",\"name\":\"IDIS Synergy BV\",\"alternateName\":\"IDIS\",\"url\":\"https:\\\/\\\/www.idisglobal.solutions\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.idisglobal.solutions\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Favicon180.png?fit=180%2C180&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.idisglobal.solutions\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Favicon180.png?fit=180%2C180&ssl=1\",\"width\":180,\"height\":180,\"caption\":\"IDIS Synergy BV\"},\"image\":{\"@id\":\"https:\\\/\\\/www.idisglobal.solutions\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/idisbenelux\\\/\",\"https:\\\/\\\/x.com\\\/IDISBenelux\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idis-benelux-bv\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCABTVe9woMH314W4IddXrJQ\",\"https:\\\/\\\/www.instagram.com\\\/idis.bnl\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Notice","description":"(Nederlands) Activiteiten ter verbetering van de cybersecurity van IDIS beperken potenti\u00eble cyberbeveiligingsrisico's en cre\u00ebren een veiligere digitale omgeving.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Notice","og_description":"{:nl}Activiteiten ter verbetering van de cybersecurity van IDIS beperken potenti\u00eble cyberbeveiligingsrisico's en cre\u00ebren een veiligere digitale omgeving.{:}","og_url":"https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/","og_site_name":"IDIS One Solution. One Company.","article_publisher":"https:\/\/www.facebook.com\/idisbenelux\/","article_modified_time":"2024-10-03T10:19:19+00:00","og_image":[{"url":"https:\/\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@IDISBenelux","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/","url":"https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/","name":"Vulnerability Notice","isPartOf":{"@id":"https:\/\/www.idisglobal.solutions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/#primaryimage"},"image":{"@id":"https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/#primaryimage"},"thumbnailUrl":"https:\/\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png","datePublished":"2024-09-25T10:02:21+00:00","dateModified":"2024-10-03T10:19:19+00:00","description":"{:nl}Activiteiten ter verbetering van de cybersecurity van IDIS beperken potenti\u00eble cyberbeveiligingsrisico's en cre\u00ebren een veiligere digitale omgeving.{:}","breadcrumb":{"@id":"https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/#primaryimage","url":"https:\/\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png","contentUrl":"https:\/\/www.idisglobal.solutions\/wp-content\/uploads\/2024\/09\/thumb_guide.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.idisglobal.solutions\/supp\/kennisgeving-kwetsbaarheid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.idisglobal.solutions\/"},{"@type":"ListItem","position":2,"name":"Support","item":"https:\/\/www.idisglobal.solutions\/supp\/"},{"@type":"ListItem","position":3,"name":"Kennisgeving kwetsbaarheid"}]},{"@type":"WebSite","@id":"https:\/\/www.idisglobal.solutions\/#website","url":"https:\/\/www.idisglobal.solutions\/","name":"IDIS One Solution. One Company.","description":"Leverancier van IP en HD-TVI camera observatiesystemen.","publisher":{"@id":"https:\/\/www.idisglobal.solutions\/#organization"},"alternateName":"IDIS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.idisglobal.solutions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.idisglobal.solutions\/#organization","name":"IDIS Synergy BV","alternateName":"IDIS","url":"https:\/\/www.idisglobal.solutions\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.idisglobal.solutions\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2022\/04\/Favicon180.png?fit=180%2C180&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.idisglobal.solutions\/wp-content\/uploads\/2022\/04\/Favicon180.png?fit=180%2C180&ssl=1","width":180,"height":180,"caption":"IDIS Synergy BV"},"image":{"@id":"https:\/\/www.idisglobal.solutions\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/idisbenelux\/","https:\/\/x.com\/IDISBenelux","https:\/\/www.linkedin.com\/company\/idis-benelux-bv","https:\/\/www.youtube.com\/channel\/UCABTVe9woMH314W4IddXrJQ","https:\/\/www.instagram.com\/idis.bnl\/"]}]}},"jetpack_shortlink":"https:\/\/wp.me\/Pa8CBw-2GI","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/pages\/10336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/comments?post=10336"}],"version-history":[{"count":5,"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/pages\/10336\/revisions"}],"predecessor-version":[{"id":10364,"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/pages\/10336\/revisions\/10364"}],"up":[{"embeddable":true,"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/pages\/508"}],"wp:attachment":[{"href":"https:\/\/www.idisglobal.solutions\/en\/wp-json\/wp\/v2\/media?parent=10336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}