Common Vulnerabilities Exposure CVE
Common Vulnerabilities Exposure is a compilation of publicly disclosed cybersecurity vulnerabilities and exposures. CVE does the identification of the vulnerabilities and categorizes them in software and firmware. The following are some of the vulnerable devices and ways of handling the vulnerabilities within the company
Smart Barcode Readers
Internet of things IoT barcode scanners or readers, helps my company branches in for retail sales at the company outlets. They are also used when there is a need for optimizing operations in the logistics department and warehouses within the company. The reader uses the AI-based sensor to detect products and transfer the data into the system automatically.
This device is prone to Common Vulnerability Exposure CVE-2020-8983. This vulnerability is caused when an unusual set up is performed. This vulnerability is exploited when some product versions create a storage zone. The vulnerability is common to consumer product inventories. To avoid this vulnerability, the users should be careful enough while using this device. They should confirm in the system whether there is a reflection in the system as intended when the device read products’ code every time. For the warehouses and retail outlets, I would recommend keenness and confirmation to ensure this vulnerability do not befall the company.
IoT Connected Factory
Our company uses IoT connected factory solution for management of the industrial IoT devices in the production section. It has a cloud software which is populated with numerous resources that allow effective control of many devices, including machines during production. To access into the control, for those who are in the production section it requires E-mail address created, registered and installed in the system at the company’s IT department for user verifications.
However, the user screens for log in engraved in the machines may have vulnerability CVE-2020-13292. This vulnerability may make the machine bypass E-mail verification which is a requirement at the start of the machine for authorization purposes. If accessed this way, the machine may result in rather breakdowns. If the machine does this to anyone, the immediate solution is to inform the department to restart the systems. To ensure that this doesn’t cost the company in future, there is a need for advanced artificial intelligence software that can’t be bypassed. The devises cant be advanced.