Customer Overview The customer is a leading research-intensive university in Asia, with a distinguished history and a reputation for excellence in teaching and research. The university has a large campus network that serves students, faculty, staff, external partners, and visitors. With the increasing threats of DDoS attacks, the customer recognized...
Blog
Common SSL Vulnerability Protection
This article describes how to configure security policies on NSFOCUS WAF for protection against some common SSL vulnerabilities. TLS Client-initiated Renegotiation Support on the Server – CVE-2011-1473 This vulnerability exists during SSL renegotiation, and services that use the SSL renegotiation function will be impacted. Although it is currently possible to...
Apple WebKit Remote Code Execution Vulnerability (CVS 2023-37450) Notification
Overview Recently, NSFOCUS CERT detected that Apple has officially fixed a 0-day vulnerability in Apple WebKit. Remote attackers can trigger this vulnerability by inducing the victim to open a specially crafted web page, which can ultimately enable the execution of arbitrary code on the target system. At present, the vulnerability...
GitLab Unauthorized Access Vulnerability (CVS 2023-3484) Notification
Overview Recently, NSFOCUS CERT monitored that GitLab officially issued a security notice, which fixed an unauthorized access vulnerability in Gitlab EE. In some cases, remote attackers with low privileges can change the name or path of a public top-level group beyond their authority. The CVSS score is 8.0. Affected users...
An Insight into RSA 2023: 5 Open Source Security Tools All Developers Should Know About
In the process of developing code, developers will worry about whether there are security problems in the image of code, dependencies and projects packaged. In the RSAC 2023 this year, David Melamed and Luke O'Malley recommended five open source security tools in their speech "5 Open Source Security Tools All...
Importing an NTA Configuration File
NTA allows users to import and export configuration files so as to meet users' requirements for quick configuration restoration and local configuration file backup. To import a configuration file, perform the following steps: Choose Administration > System Configuration > Basic Information > Import Config. Select a configuration file to be...





