CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    8.8

    CVSS31
    CVE-2025-24201 - Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability -

    Action Due Apr 03, 2025 ( 16 days left ) Target Vendor : Apple

    Description : Apple iOS, iPadOS, macOS, and other Apple products contain an out-of-bounds write vulnerability in WebKit that may allow maliciously crafted web content to break out of Web Content sandbox. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/122281 ; https://support.apple.com/en-us/122283 ; https://support.apple.com/en-us/122284 ; https://support.apple.com/en-us/122285 ; ; https://nvd.nist.gov/vuln/detail/CVE-2025-24201

    Alert Date: Mar 13, 2025 | 4 days ago

    4.4

    CVSS31
    CVE-2025-21590 - Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability -

    Action Due Apr 03, 2025 ( 16 days left ) Target Vendor : Juniper

    Description : Juniper Junos OS contains an improper isolation or compartmentalization vulnerability. This vulnerability could allows a local attacker with high privileges to inject arbitrary code.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2025-21590

    Alert Date: Mar 13, 2025 | 4 days ago

    7.0

    CVSS31
    CVE-2025-26633 - Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability -

    Action Due Apr 01, 2025 ( 14 days left ) Target Vendor : Microsoft

    Description : Microsoft Windows Management Console (MMC) contains an improper neutralization vulnerability that allows an unauthorized attacker to execute code over a network.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26633 ; https://nvd.nist.gov/vuln/detail/CVE-2025-26633

    Alert Date: Mar 11, 2025 | 6 days ago

    7.0

    CVSS31
    CVE-2025-24983 - Microsoft Windows Win32k Use-After-Free Vulnerability -

    Action Due Apr 01, 2025 ( 14 days left ) Target Vendor : Microsoft

    Description : Microsoft Windows Win32 Kernel Subsystem contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24983 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24983

    Alert Date: Mar 11, 2025 | 6 days ago

    4.6

    CVSS31
    CVE-2025-24984 - Microsoft Windows NTFS Information Disclosure Vulnerability -

    Action Due Apr 01, 2025 ( 14 days left ) Target Vendor : Microsoft

    Description : Microsoft Windows New Technology File System (NTFS) contains an insertion of sensitive Information into log file vulnerability that allows an authorized attacker to disclose information locally. An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24984 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24984

    Alert Date: Mar 11, 2025 | 6 days ago

    7.8

    CVSS31
    CVE-2025-24985 - Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability -

    Action Due Apr 01, 2025 ( 14 days left ) Target Vendor : Microsoft

    Description : Microsoft Windows Fast FAT File System Driver contains an integer overflow or wraparound vulnerability that allows an unauthorized attacker to execute code with a physical attack.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24985 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24985

    Alert Date: Mar 11, 2025 | 6 days ago

    5.5

    CVSS31
    CVE-2025-24991 - Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability -

    Action Due Apr 01, 2025 ( 14 days left ) Target Vendor : Microsoft

    Description : Microsoft Windows New Technology File System (NTFS) contains an out-of-bounds read vulnerability that could allow for information disclosure.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24991 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24991

    Alert Date: Mar 11, 2025 | 6 days ago

    7.8

    CVSS31
    CVE-2025-24993 - Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability -

    Action Due Apr 01, 2025 ( 14 days left ) Target Vendor : Microsoft

    Description : Microsoft Windows New Technology File System (NTFS) contains a heap-based buffer overflow vulnerability that could allow an authorized attacker to execute code locally.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24993 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24993

    Alert Date: Mar 11, 2025 | 6 days ago

    7.5

    CVSS31
    CVE-2025-25181 - Advantive VeraCore SQL Injection Vulnerability -

    Action Due Mar 31, 2025 ( 13 days left ) Target Vendor : Advantive

    Description : Advantive VeraCore contains a SQL injection vulnerability in timeoutWarning.asp that allows a remote attacker to execute arbitrary SQL commands via the PmSess1 parameter.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://advantive.my.site.com/support/s/article/Veracore-Release-Notes-2025-1-1-3 ; https://nvd.nist.gov/vuln/detail/CVE-2025-25181

    Alert Date: Mar 10, 2025 | 7 days ago

    9.9

    CVSS31
    CVE-2024-57968 - Advantive VeraCore Unrestricted File Upload Vulnerability -

    Action Due Mar 31, 2025 ( 13 days left ) Target Vendor : Advantive

    Description : Advantive VeraCore contains an unrestricted file upload vulnerability that allows a remote unauthenticated attacker to upload files to unintended folders via upload.apsx.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://advantive.my.site.com/support/s/article/VeraCore-Release-Notes-2024-4-2-1 ; https://nvd.nist.gov/vuln/detail/CVE-2024-57968

    Alert Date: Mar 10, 2025 | 7 days ago

    9.8

    CVSS31
    CVE-2024-13159 - Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability -

    Action Due Mar 31, 2025 ( 13 days left ) Target Vendor : Ivanti

    Description : Ivanti Endpoint Manager (EPM) contains an absolute path traversal vulnerability that allows a remote unauthenticated attacker to leak sensitive information.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-13159

    Alert Date: Mar 10, 2025 | 7 days ago

    9.8

    CVSS31
    CVE-2024-13160 - Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability -

    Action Due Mar 31, 2025 ( 13 days left ) Target Vendor : Ivanti

    Description : Ivanti Endpoint Manager (EPM) contains an absolute path traversal vulnerability that allows a remote unauthenticated attacker to leak sensitive information.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-13160

    Alert Date: Mar 10, 2025 | 7 days ago

    9.8

    CVSS31
    CVE-2024-13161 - Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability -

    Action Due Mar 31, 2025 ( 13 days left ) Target Vendor : Ivanti

    Description : Ivanti Endpoint Manager (EPM) contains an absolute path traversal vulnerability that allows a remote unauthenticated attacker to leak sensitive information.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-13161

    Alert Date: Mar 10, 2025 | 7 days ago

    7.8

    CVSS31
    CVE-2024-50302 - Linux Kernel Use of Uninitialized Resource Vulnerability -

    Action Due Mar 25, 2025 ( 7 days left ) Target Vendor : Linux

    Description : The Linux kernel contains a use of uninitialized resource vulnerability that allows an attacker to leak kernel memory via a specially crafted HID report.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lore.kernel.org/linux-cve-announce/2024111908-CVE-2024-50302-f677@gregkh/ ; https://source.android.com/docs/security/bulletin/2025-03-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-50302

    Alert Date: Mar 04, 2025 | 13 days ago

    9.3

    CVSS31
    CVE-2025-22224 - VMware ESXi and Workstation TOCTOU Race Condition Vulnerability -

    Action Due Mar 25, 2025 ( 7 days left ) Target Vendor : VMware

    Description : VMware ESXi and Workstation contain a time-of-check time-of-use (TOCTOU) race condition vulnerability that leads to an out-of-bounds write. Successful exploitation enables an attacker with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22224

    Alert Date: Mar 04, 2025 | 13 days ago

    8.2

    CVSS31
    CVE-2025-22225 - VMware ESXi Arbitrary Write Vulnerability -

    Action Due Mar 25, 2025 ( 7 days left ) Target Vendor : VMware

    Description : VMware ESXi contains an arbitrary write vulnerability. Successful exploitation allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write leading to an escape of the sandbox.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22225

    Alert Date: Mar 04, 2025 | 13 days ago

    7.1

    CVSS31
    CVE-2025-22226 - VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability -

    Action Due Mar 25, 2025 ( 7 days left ) Target Vendor : VMware

    Description : VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. Successful exploitation allows an attacker with administrative privileges to a virtual machine to leak memory from the vmx process.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22226

    Alert Date: Mar 04, 2025 | 13 days ago

    7.2

    CVSS31
    CVE-2023-20118 - Cisco Small Business RV Series Routers Command Injection Vulnerability -

    Action Due Mar 24, 2025 ( 6 days left ) Target Vendor : Cisco

    Description : Multiple Cisco Small Business RV Series Routers contains a command injection vulnerability in the web-based management interface. Successful exploitation could allow an authenticated, remote attacker to gain root-level privileges and access unauthorized data.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 ; https://nvd.nist.gov/vuln/detail/CVE-2023-20118

    Alert Date: Mar 03, 2025 | 14 days ago

    9.8

    CVSS31
    CVE-2022-43939 - Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability -

    Action Due Mar 24, 2025 ( 6 days left ) Target Vendor : Hitachi Vantara

    Description : Hitachi Vantara Pentaho BA Server contains a use of non-canonical URL paths for authorization decisions vulnerability that enables an attacker to bypass authorization.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.pentaho.com/hc/en-us/articles/14455394120333--Resolved-Pentaho-BA-Server-Use-of-Non-Canonical-URL-Paths-for-Authorization-Decisions-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43939- ; https://nvd.nist.gov/vuln/detail/CVE-2022-43939

    Alert Date: Mar 03, 2025 | 14 days ago

    8.8

    CVSS31
    CVE-2022-43769 - Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability -

    Action Due Mar 24, 2025 ( 6 days left ) Target Vendor : Hitachi Vantara

    Description : Hitachi Vantara Pentaho BA Server contains a special element injection vulnerability that allows an attacker to inject Spring templates into properties files, allowing for arbitrary command execution.

    Action : Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.pentaho.com/hc/en-us/articles/14455561548301--Resolved-Pentaho-BA-Server-Failure-to-Sanitize-Special-Elements-into-a-Different-Plane-Special-Element-Injection-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43769 ; https://nvd.nist.gov/vuln/detail/CVE-2022-43769

    Alert Date: Mar 03, 2025 | 14 days ago
Showing 20 of 1304 Results

Filters

© cvefeed.io
Latest DB Update: Mar. 17, 2025 21:25