CISA Known Exploited Vulnerabilities Catalog
9.3
CVE-2012-4792 - Microsoft Internet Explorer Use-After-Free Vulnerability -
Action Due Aug 13, 2024 ( 16 days left ) Target Vendor : Microsoft
Description : Microsoft Internet Explorer contains a use-after-free vulnerability that allows a remote attacker to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object.
Action : The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://learn.microsoft.com/en-us/lifecycle/products/internet-explorer-11
5.3
CVE-2024-39891 - Twilio Authy Information Disclosure Vulnerability -
Action Due Aug 13, 2024 ( 16 days left ) Target Vendor : Twilio
Description : Twilio Authy contains an information disclosure vulnerability in its API that allows an unauthenticated endpoint to accept a request containing a phone number and respond with information about whether the phone number was registered with Authy.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.twilio.com/en-us/changelog/Security_Alert_Authy_App_Android_iOS
9.8
CVE-2024-34102 - Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability -
Action Due Aug 07, 2024 ( 10 days left ) Target Vendor : Adobe
Description : Adobe Commerce and Magento Open Source contain an improper restriction of XML external entity reference (XXE) vulnerability that allows for remote code execution.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://helpx.adobe.com/security/products/magento/apsb24-40.html
8.6
CVE-2024-28995 - SolarWinds Serv-U Path Traversal Vulnerability -
Action Due Aug 07, 2024 ( 10 days left ) Target Vendor : SolarWinds
Description : SolarWinds Serv-U contains a path traversal vulnerability that allows an attacker access to read sensitive files on the host machine.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995
6.5
CVE-2022-22948 - VMware vCenter Server Incorrect Default File Permissions Vulnerability -
Action Due Aug 07, 2024 ( 10 days left ) Target Vendor : VMware
Description : VMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.vmware.com/security/advisories/VMSA-2022-0009.html
9.8
CVE-2024-36401 - OSGeo GeoServer GeoTools Eval Injection Vulnerability -
Action Due Aug 05, 2024 ( 8 days left ) Target Vendor : OSGeo
Description : OSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv, https://github.com/geotools/geotools/pull/4797
9.8
CVE-2024-23692 - Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability -
Action Due Jul 30, 2024 ( 2 days left ) Target Vendor : Rejetto
Description : Rejetto HTTP File Server contains an improper neutralization of special elements used in a template engine vulnerability. This allows a remote, unauthenticated attacker to execute commands on the affected system by sending a specially crafted HTTP request.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : The patched Rejetto HTTP File Server (HFS) is version 3: https://github.com/rejetto/hfs?tab=readme-ov-file#installation, https://www.rejetto.com/hfs/
7.8
CVE-2024-38080 - Microsoft Windows Hyper-V Privilege Escalation Vulnerability -
Action Due Jul 30, 2024 ( 2 days left ) Target Vendor : Microsoft
Description : Microsoft Windows Hyper-V contains a privilege escalation vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38080
7.5
CVE-2024-38112 - Microsoft Windows MSHTML Platform Spoofing Vulnerability -
Action Due Jul 30, 2024 ( 2 days left ) Target Vendor : Microsoft
Description : Microsoft Windows MSHTML Platform contains a spoofing vulnerability that has a high impact to confidentiality, integrity, and availability.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112
6.7
CVE-2024-20399 - Cisco NX-OS Command Injection Vulnerability -
Action Due Jul 23, 2024 Target Vendor : Cisco
Description : Cisco NX-OS contains a command injection vulnerability in the command line interface (CLI) that could allow an authenticated, local attacker to execute commands as root on the underlying operating system of an affected device.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP
6.3
CVE-2020-13965 - Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability -
Action Due Jul 17, 2024 Target Vendor : Roundcube
Description : Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to manipulate data via a malicious XML attachment.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12
7.8
CVE-2022-2586 - Linux Kernel Use-After-Free Vulnerability -
Action Due Jul 17, 2024 Target Vendor : Linux
Description : Linux Kernel contains a use-after-free vulnerability in the nft_object, allowing local attackers to escalate privileges.
Action : Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://seclists.org/oss-sec/2022/q3/131
10.0
CVE-2022-24816 - GeoSolutionsGroup JAI-EXT Code Injection Vulnerability -
Action Due Jul 17, 2024 Target Vendor : GeoSolutionsGroup
Description : GeoSolutionsGroup JAI-EXT, a component of GeoSolutions GeoServer, contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. The patched JAI-EXT is version 1.1.22: https://github.com/geosolutions-it/jai-ext/releases/tag/1.1.22, https://github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx
9.8
CVE-2024-4358 - Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability -
Action Due Jul 04, 2024 Target Vendor : Progress
Description : Progress Telerik Report Server contains an authorization bypass by spoofing vulnerability that allows an attacker to obtain unauthorized access.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358
7.8
CVE-2024-26169 - Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability -
Action Due Jul 04, 2024 Target Vendor : Microsoft
Description : Microsoft Windows Error Reporting Service contains an improper privilege management vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.
Action : Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
Known To Be Used in Ransomware Campaigns? : Known
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26169
8.1
CVE-2024-32896 - Android Pixel Privilege Escalation Vulnerability -
Action Due Jul 04, 2024 Target Vendor : Android
Description : Android Pixel contains an unspecified vulnerability in the firmware that allows for privilege escalation.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://source.android.com/docs/security/bulletin/pixel/2024-06-01
9.8
CVE-2024-4577 - PHP-CGI OS Command Injection Vulnerability -
Action Due Jul 03, 2024 Target Vendor : PHP Group
Description : PHP, specifically Windows-based PHP used in CGI mode, contains an OS command injection vulnerability that allows for arbitrary code execution. This vulnerability is a patch bypass for CVE-2012-1823.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Known
Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://www.php.net/ChangeLog-8.php#
7.4
CVE-2024-4610 - Arm Mali GPU Kernel Driver Use-After-Free Vulnerability -
Action Due Jul 03, 2024 Target Vendor : Arm
Description : Arm Bifrost and Valhall GPU kernel drivers contain a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities
7.4
CVE-2017-3506 - Oracle WebLogic Server OS Command Injection Vulnerability -
Action Due Jun 24, 2024 Target Vendor : Oracle
Description : Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an OS command injection vulnerability that allows an attacker to execute arbitrary code via a specially crafted HTTP request that includes a malicious XML document.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.oracle.com/security-alerts/cpuapr2017.html
7.8
CVE-2024-1086 - Linux Kernel Use-After-Free Vulnerability -
Action Due Jun 20, 2024 Target Vendor : Linux
Description : Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660