UNCLASSIFIED - NO CUI

Skip to content

chore(findings): veeam/kasten/frsession

Summary

veeam/kasten/frsession has 60 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=veeam/kasten/frsession&tag=8.0.12&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2019-3826 Anchore CVE Medium github.com/prometheus/prometheus-v1.8.2-0.20220315145411-881111fec433 0.02344 false
CVE-2019-3826 Anchore CVE Medium github.com/prometheus/prometheus-v1.8.2-0.20220315145411-881111fec433 0.02344 false
CVE-2019-3826 Anchore CVE Medium github.com/prometheus/prometheus-v1.8.2-0.20220315145411-881111fec433 0.02344 false
CVE-2019-3826 Anchore CVE Medium github.com/prometheus/prometheus-v1.8.2-0.20220315145411-881111fec433 0.02344 false
CVE-2024-41996 Anchore CVE Low openssl-1:3.2.2-6.el9_5.1 0.00446 false
CVE-2024-12086 Twistlock CVE Medium rsync-3.2.5-3.el9 0.00267 false
CVE-2024-12086 Anchore CVE Medium rsync-3.2.5-3.el9 0.00267 false
CVE-2024-13176 Anchore CVE Low openssl-1:3.2.2-6.el9_5.1 0.00118 false
CVE-2024-43403 Twistlock CVE Low github.com/kanisterio/kanister-v0.0.0-20250912043622-60c455153640 0.00065 false
CVE-2025-4598 Anchore CVE Medium systemd-rpm-macros-252-51.el9_6.3 0.00053 false
CVE-2025-4598 Anchore CVE Medium systemd-252-51.el9_6.3 0.00053 false
CVE-2025-4598 Anchore CVE Medium systemd-pam-252-51.el9_6.3 0.00053 false
CVE-2025-32728 Twistlock CVE Medium openssh-8.7p1-45.el9 0.00030 false
CVE-2025-32728 Anchore CVE Medium openssh-server-8.7p1-45.el9 0.00030 false
CVE-2025-32728 Anchore CVE Medium openssh-clients-8.7p1-45.el9 0.00030 false
CVE-2025-32728 Anchore CVE Medium openssh-8.7p1-45.el9 0.00030 false
CVE-2025-9230 Anchore CVE Medium openssl-1:3.2.2-6.el9_5.1 0.00026 false
CVE-2025-9232 Anchore CVE Low openssl-1:3.2.2-6.el9_5.1 0.00023 false
CVE-2025-61984 Twistlock CVE Medium openssh-8.7p1-45.el9 0.00013 false
CVE-2025-61984 Anchore CVE Medium openssh-8.7p1-45.el9 0.00013 false
CVE-2025-61984 Anchore CVE Medium openssh-server-8.7p1-45.el9 0.00013 false
CVE-2025-61984 Anchore CVE Medium openssh-clients-8.7p1-45.el9 0.00013 false
CVE-2025-61985 Twistlock CVE Medium openssh-8.7p1-45.el9 0.00012 false
CVE-2025-61985 Anchore CVE Medium openssh-server-8.7p1-45.el9 0.00012 false
CVE-2025-61985 Anchore CVE Medium openssh-8.7p1-45.el9 0.00012 false
CVE-2025-61985 Anchore CVE Medium openssh-clients-8.7p1-45.el9 0.00012 false
CVE-2023-51767 Anchore CVE Medium openssh-server-8.7p1-45.el9 0.00008 false
CVE-2023-51767 Anchore CVE Medium openssh-clients-8.7p1-45.el9 0.00008 false
CVE-2023-51767 Anchore CVE Medium openssh-8.7p1-45.el9 0.00008 false
e7573262736ef52353cde3bae2617782 Anchore Compliance Low N/A N/A
addbb93c22e9b0988b8b40392a4538cb Anchore Compliance Low N/A N/A
abb121e9621abdd452f65844954cf1c1 Anchore Compliance Low N/A N/A
CCE-90085-2 OSCAP Compliance Medium N/A N/A
CCE-88413-0 OSCAP Compliance Medium N/A N/A
CCE-86356-3 OSCAP Compliance Medium N/A N/A
CCE-86100-5 OSCAP Compliance Medium N/A N/A
CCE-86068-4 OSCAP Compliance Medium N/A N/A
CCE-83984-5 OSCAP Compliance Medium N/A N/A
CCE-83980-3 OSCAP Compliance Medium N/A N/A
CCE-83979-5 OSCAP Compliance Medium N/A N/A
CCE-83641-1 OSCAP Compliance Low N/A N/A
CCE-83621-3 OSCAP Compliance Medium N/A N/A
CCE-83615-5 OSCAP Compliance Medium N/A N/A
CCE-83589-2 OSCAP Compliance Medium N/A N/A
CCE-83588-4 OSCAP Compliance Medium N/A N/A
CCE-83587-6 OSCAP Compliance Medium N/A N/A
CCE-83583-5 OSCAP Compliance Medium N/A N/A
CCE-83579-3 OSCAP Compliance Medium N/A N/A
CCE-83575-1 OSCAP Compliance Medium N/A N/A
CCE-83570-2 OSCAP Compliance Medium N/A N/A
CCE-83568-6 OSCAP Compliance Medium N/A N/A
CCE-83567-8 OSCAP Compliance Medium N/A N/A
CCE-83566-0 OSCAP Compliance Medium N/A N/A
CCE-83565-2 OSCAP Compliance Medium N/A N/A
CCE-83564-5 OSCAP Compliance Medium N/A N/A
CCE-83563-7 OSCAP Compliance Medium N/A N/A
698044205a9c4a6d48b7937e66a6bf4f Anchore Compliance Low N/A N/A
3e5fad1c039f3ecfd1dcdc94d2f1f9a0 Anchore Compliance Low N/A N/A
34de21e516c0ca50a96e5386f163f8bf Anchore Compliance Low N/A N/A
320a97c6816565eedf3545833df99dd0 Anchore Compliance Low N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=veeam/kasten/frsession&tag=8.0.12&branch=master

Tasks

Contributor:

  • Apply the StatusReview label to this issue for a merge request review and wait for feedback

OR

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue for a VAT justifications review and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Review or Verification label will be removed and the issue will be sent back to To-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Review or Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information