CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    8.4

    CVSS31
    CVE-2024-4978 - Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability -

    Action Due Jun 19, 2024 ( 19 days left ) Target Vendor : Justice AV Solutions

    Description : Justice AV Solutions (JAVS) Viewer installer contains a malicious version of ffmpeg.exe, named fffmpeg.exe (SHA256: 421a4ad2615941b177b6ec4ab5e239c14e62af2ab07c6df1741e2a62223223c4). When run, this creates a backdoor connection to a malicious C2 server.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : Please follow the vendor’s instructions as outlined in the public statements at https://www.rapid7.com/blog/post/2024/05/23/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack#remediation and https://www.javs.com/downloads

    Alert Date: May 29, 2024 | 1 days ago

    8.8

    CVSS31
    CVE-2024-5274 - Google Chromium V8 Type Confusion Vulnerability -

    Action Due Jun 18, 2024 ( 18 days left ) Target Vendor : Google

    Description : Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html?m=1

    Alert Date: May 28, 2024 | 2 days ago

    7.5

    CVSS31
    CVE-2020-17519 - Apache Flink Improper Access Control Vulnerability -

    Action Due Jun 13, 2024 ( 13 days left ) Target Vendor : Apache

    Description : Apache Flink contains an improper access control vulnerability that allows an attacker to read any file on the local filesystem of the JobManager through its REST interface.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/typ0h03zyfrzjqlnb7plh64df1g2383d

    Alert Date: May 23, 2024 | 7 days ago

    9.8

    CVSS31
    CVE-2023-43208 - NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability -

    Action Due Jun 10, 2024 ( 10 days left ) Target Vendor : NextGen Healthcare

    Description : NextGen Healthcare Mirth Connect contains a deserialization of untrusted data vulnerability that allows for unauthenticated remote code execution via a specially crafted request.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://github.com/nextgenhealthcare/connect/wiki/4.4.1---What%27s-New

    Alert Date: May 20, 2024 | 10 days ago

    8.8

    CVSS31
    CVE-2024-4947 - Google Chromium V8 Type Confusion Vulnerability -

    Action Due Jun 10, 2024 ( 10 days left ) Target Vendor : Google

    Description : Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html

    Alert Date: May 20, 2024 | 10 days ago

    6.8

    CVSS2
    CVE-2014-100005 - D-Link DIR-600 Router Cross-Site Request Forgery (CSRF) Vulnerability -

    Action Due Jun 06, 2024 ( 6 days left ) Target Vendor : D-Link

    Description : D-Link DIR-600 routers contain a cross-site request forgery (CSRF) vulnerability that allows an attacker to change router configurations by hijacking an existing administrator session.

    Action : This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://legacy.us.dlink.com/pages/product.aspx?id=4587b63118524aec911191cc81605283

    Alert Date: May 16, 2024 | 14 days ago

    7.5

    CVSS31
    CVE-2021-40655 - D-Link DIR-605 Router Information Disclosure Vulnerability -

    Action Due Jun 06, 2024 ( 6 days left ) Target Vendor : D-Link

    Description : D-Link DIR-605 routers contain an information disclosure vulnerability that allows attackers to obtain a username and password by forging a post request to the /getcfg.php page.

    Action : This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://legacy.us.dlink.com/pages/product.aspx?id=2b09e95d90ff4cb38830ecc04c89cee5

    Alert Date: May 16, 2024 | 14 days ago

    8.8

    CVSS31
    CVE-2024-4761 - Google Chromium V8 Out-of-Bounds Memory Write Vulnerability -

    Action Due Jun 06, 2024 ( 6 days left ) Target Vendor : Google

    Description : Google Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_13.html

    Alert Date: May 16, 2024 | 14 days ago

    7.8

    CVSS31
    CVE-2024-30051 - Microsoft DWM Core Library Privilege Escalation Vulnerability -

    Action Due Jun 04, 2024 ( 4 days left ) Target Vendor : Microsoft

    Description : Microsoft DWM Core Library contains a privilege escalation vulnerability that allows an attacker to gain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051

    Alert Date: May 14, 2024 | 16 days ago

    8.8

    CVSS31
    CVE-2024-30040 - Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability -

    Action Due Jun 04, 2024 ( 4 days left ) Target Vendor : Microsoft

    Description : Microsoft Windows MSHTML Platform contains an unspecified vulnerability that allows for a security feature bypass.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040

    Alert Date: May 14, 2024 | 16 days ago

    9.6

    CVSS31
    CVE-2024-4671 - Google Chromium Visuals Use-After-Free Vulnerability -

    Action Due Jun 03, 2024 ( 3 days left ) Target Vendor : Google

    Description : Google Chromium Visuals contains a use-after-free vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html?m=1

    Alert Date: May 13, 2024 | 17 days ago

    10.0

    CVSS31
    CVE-2023-7028 - GitLab Community and Enterprise Editions Improper Access Control Vulnerability -

    Action Due May 22, 2024 Target Vendor : GitLab

    Description : GitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/

    Alert Date: May 01, 2024 | 29 days ago

    8.8

    CVSS31
    CVE-2024-29988 - Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability -

    Action Due May 21, 2024 Target Vendor : Microsoft

    Description : Microsoft SmartScreen Prompt contains a security feature bypass vulnerability that allows an attacker to bypass the Mark of the Web (MotW) feature. This vulnerability can be chained with CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988

    Alert Date: Apr 30, 2024 | 30 days ago

    10.0

    CVSS31
    CVE-2024-4040 - CrushFTP VFS Sandbox Escape Vulnerability -

    Action Due May 01, 2024 Target Vendor : CrushFTP

    Description : CrushFTP contains an unspecified sandbox escape vulnerability that allows a remote attacker to escape the CrushFTP virtual file system (VFS).

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update&version=34

    Alert Date: Apr 24, 2024 | 36 days ago

    6.0

    CVSS31
    CVE-2024-20359 - Cisco ASA and FTD Privilege Escalation Vulnerability -

    Action Due May 01, 2024 Target Vendor : Cisco

    Description : Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a privilege escalation vulnerability that can allow local privilege escalation from Administrator to root.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h

    Alert Date: Apr 24, 2024 | 36 days ago

    8.6

    CVSS31
    CVE-2024-20353 - Cisco ASA and FTD Denial of Service Vulnerability -

    Action Due May 01, 2024 Target Vendor : Cisco

    Description : Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an infinite loop vulnerability that can lead to remote denial of service condition.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2

    Alert Date: Apr 24, 2024 | 36 days ago

    7.8

    CVSS31
    CVE-2022-38028 - Microsoft Windows Print Spooler Privilege Escalation Vulnerability -

    Action Due May 14, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows Print Spooler service contains a privilege escalation vulnerability. An attacker may modify a JavaScript constraints file and execute it with SYSTEM-level permissions.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38028

    Alert Date: Apr 23, 2024 | 37 days ago

    10.0

    CVSS31
    CVE-2024-3400 - Palo Alto Networks PAN-OS Command Injection Vulnerability -

    Action Due Apr 19, 2024 Target Vendor : Palo Alto Networks

    Description : Palo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.

    Action : Users of affected devices should enable Threat Prevention Threat ID 95187 if that is available, otherwise, disable device telemetry until patches are available from the vendor, per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.paloaltonetworks.com/CVE-2024-3400

    Alert Date: Apr 12, 2024 | 48 days ago

    9.8

    CVSS31
    CVE-2024-3273 - D-Link Multiple NAS Devices Command Injection Vulnerability -

    Action Due May 02, 2024 Target Vendor : D-Link

    Description : D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contain a command injection vulnerability. When combined with CVE-2024-3272, this can lead to remote, unauthorized code execution.

    Action : This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383

    Alert Date: Apr 11, 2024 | 49 days ago

    9.8

    CVSS31
    CVE-2024-3272 - D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability -

    Action Due May 02, 2024 Target Vendor : D-Link

    Description : D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded credential that allows an attacker to conduct authenticated command injection, leading to remote, unauthorized code execution.

    Action : This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383

    Alert Date: Apr 11, 2024 | 49 days ago
Showing 20 of 1115 Results

Filters