You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/About Arduino/Arduino Security Bulletins/ASEC-21-001-Vulnerabilities-in-Apache-Log4j.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,4 +24,5 @@ The Log4j library was removed in Arduino IDE 1.8.19.
24
24
| 2021-12-14 |[1.8.17](https://github.com/arduino/Arduino/releases/tag/1.8.17)| Upgraded Log4j to 2.15.0, resolving [CVE-2021-44228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228)|
25
25
| 2021-09-06 |[1.8.16](https://github.com/arduino/Arduino/releases/tag/1.8.16)| Using Log4j 2.12.0 |
26
26
27
-
> **Note:** The record creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
27
+
> [!NOTE]
28
+
> The record creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Copy file name to clipboardExpand all lines: content/About Arduino/Arduino Security Bulletins/ASEC-23-001-Vulnerabilities-in-Arduino-Create-Agent-1-3-2.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ The identified vulnerabilities may allow an attacker, with local access to the v
35
35
36
36
## Action Required
37
37
38
-
All users are advised to update the Arduino Create Agent to version 1.3.3 or later. An update is automatically initiated when visiting the Arduino Web Editor or when setting up a new device via the Arduino IoT Cloud. Alternatively, a manual update can be performed by downloading the new version of the software [here](https://github.com/arduino/arduino-create-agent/releases).
38
+
All users are advised to update the Arduino Create Agent to version 1.3.3 or later. An update is automatically initiated when visiting the Arduino Cloud Editor or when setting up a new device in Arduino Cloud. Alternatively, a manual update can be performed by downloading the new version of the software [here](https://github.com/arduino/arduino-create-agent/releases).
title: ASEC-23-002 - Vulnerabilities in Arduino Create Agent 1.3.5
3
+
id: 11832917802652
4
+
---
5
+
6
+
Bulletin ID: ASEC-23-002
7
+
Date: Dec 13, 2023
8
+
Product/Component: Arduino Create Agent
9
+
Affected versions: <= 1.3.5
10
+
Fixed version: 1.3.6
11
+
12
+
## Summary
13
+
14
+
This security bulletin provides information on a series of security vulnerabilities that have been identified in the Arduino Create Agent version 1.3.5 and below.
15
+
16
+
Details on the security vulnerabilities and related advisories can be found below.
The identified vulnerabilities may allow an attacker to persuade a victim into clicking on a malicious link and perform a Reflected Cross-Site Scripting attack on the web interface of the create agent, which would allow the attacker to execute arbitrary browser client side code.
25
+
26
+
## Action Required
27
+
28
+
All users are advised to update the Arduino Create Agent to version 1.3.6 or later. An update is automatically initiated when visiting the Arduino Cloud Editor or when setting up a new device via Arduino Cloud. Alternatively, a manual update can be performed by downloading the new version of the software [here](https://github.com/arduino/arduino-create-agent/releases).
If you encounter any issues or have questions regarding this security update, please contact our security team at [[email protected]](mailto:[email protected]).
0 commit comments