CISA Known Exploited Vulnerabilities Catalog
9.8
CVE-2023-27997 - Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability -
Action Due Jul 04, 2023 Target Vendor : Fortinet
Description : Fortinet FortiOS and FortiProxy SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute code or commands via specifically crafted requests.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.fortiguard.com/psirt/FG-IR-23-097
8.8
CVE-2023-3079 - Google Chromium V8 Type Confusion Vulnerability -
Action Due Jun 28, 2023 Target Vendor : Google
Description : Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html
9.8
CVE-2023-33009 - Zyxel Multiple Firewalls Buffer Overflow Vulnerability -
Action Due Jun 26, 2023 Target Vendor : Zyxel
Description : Zyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the notification function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls
9.8
CVE-2023-33010 - Zyxel Multiple Firewalls Buffer Overflow Vulnerability -
Action Due Jun 26, 2023 Target Vendor : Zyxel
Description : Zyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the ID processing function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls
9.8
CVE-2023-34362 - Progress MOVEit Transfer SQL Injection Vulnerability -
Action Due Jun 23, 2023 Target Vendor : Progress
Description : Progress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delete database elements.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known
Notes : This CVE has a CISA AA located here: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a. Please see the AA for associated IOCs. Additional information is available at: https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023.
9.8
CVE-2023-28771 - Zyxel Multiple Firewalls OS Command Injection Vulnerability -
Action Due Jun 21, 2023 Target Vendor : Zyxel
Description : Zyxel ATP, USG FLEX, VPN, and ZyWALL/USG firewalls allow for improper error message handling which could allow an unauthenticated attacker to execute OS commands remotely by sending crafted packets to an affected device.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls
9.8
CVE-2023-2868 - Barracuda Networks ESG Appliance Improper Input Validation Vulnerability -
Action Due Jun 16, 2023 Target Vendor : Barracuda Networks
Description : Barracuda Email Security Gateway (ESG) appliance contains an improper input validation vulnerability of a user-supplied .tar file, leading to remote command injection.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://status.barracuda.com/incidents/34kx82j5n4q9
8.6
CVE-2023-32409 - Apple Multiple Products WebKit Sandbox Escape Vulnerability -
Action Due Jun 12, 2023 Target Vendor : Apple
Description : Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an unspecified vulnerability that can allow a remote attacker to break out of the Web Content sandbox.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://support.apple.com/HT213757, https://support.apple.com/HT213758, https://support.apple.com/HT213761, https://support.apple.com/HT213762, https://support.apple.com/HT213764, https://support.apple.com/HT213765
6.5
CVE-2023-28204 - Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability -
Action Due Jun 12, 2023 Target Vendor : Apple
Description : Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://support.apple.com/HT213757, https://support.apple.com/HT213758, https://support.apple.com/HT213761, https://support.apple.com/HT213762, https://support.apple.com/HT213764, https://support.apple.com/HT213765
8.8
CVE-2023-32373 - Apple Multiple Products WebKit Use-After-Free Vulnerability -
Action Due Jun 12, 2023 Target Vendor : Apple
Description : Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://support.apple.com/HT213757, https://support.apple.com/HT213758, https://support.apple.com/HT213761, https://support.apple.com/HT213762, https://support.apple.com/HT213764, https://support.apple.com/HT213765
5.9
CVE-2004-1464 - Cisco IOS Denial-of-Service Vulnerability -
Action Due Jun 09, 2023 Target Vendor : Cisco
Description : Cisco IOS contains an unspecified vulnerability that may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases, Hypertext Transport Protocol (HTTP) access to the Cisco device.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040827-telnet
7.5
CVE-2016-6415 - Cisco IOS, IOS XR, and IOS XE IKEv1 Information Disclosure Vulnerability -
Action Due Jun 09, 2023 Target Vendor : Cisco
Description : Cisco IOS, IOS XR, and IOS XE contain insufficient condition checks in the part of the code that handles Internet Key Exchange version 1 (IKEv1) security negotiation requests. contains an information disclosure vulnerability in the Internet Key Exchange version 1 (IKEv1) that could allow an attacker to retrieve memory contents. Successful exploitation could allow the attacker to retrieve memory contents, which can lead to information disclosure.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1
4.4
CVE-2023-21492 - Samsung Mobile Devices Insertion of Sensitive Information Into Log File Vulnerability -
Action Due Jun 09, 2023 Target Vendor : Samsung
Description : Samsung mobile devices running Android 11, 12, and 13 contain an insertion of sensitive information into log file vulnerability that allows a privileged, local attacker to conduct an address space layout randomization (ASLR) bypass.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://security.samsungmobile.com/securityUpdate.smsb
9.8
CVE-2023-25717 - Multiple Ruckus Wireless Products CSRF and RCE Vulnerability -
Action Due Jun 02, 2023 Target Vendor : Ruckus Wireless
Description : Ruckus Wireless Access Point (AP) software contains an unspecified vulnerability in the web services component. If the web services component is enabled on the AP, an attacker can perform cross-site request forgery (CSRF) or remote code execution (RCE). This vulnerability impacts Ruckus ZoneDirector, SmartZone, and Solo APs.
Action : Apply updates per vendor instructions or disconnect product if it is end-of-life.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://support.ruckuswireless.com/security_bulletins/315
7.8
CVE-2021-3560 - Red Hat Polkit Incorrect Authorization Vulnerability -
Action Due Jun 02, 2023 Target Vendor : Red Hat
Description : Red Hat Polkit contains an incorrect authorization vulnerability through the bypassing of credential checks for D-Bus requests, allowing for privilege escalation.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://bugzilla.redhat.com/show_bug.cgi?id=1961710
6.9
CVE-2014-0196 - Linux Kernel Race Condition Vulnerability -
Action Due Jun 02, 2023 Target Vendor : Linux
Description : Linux Kernel contains a race condition vulnerability within the n_tty_write function that allows local users to cause a denial-of-service (DoS) or gain privileges via read and write operations with long strings.
Action : The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://lkml.iu.edu/hypermail/linux/kernel/1609.1/02103.html
7.8
CVE-2010-3904 - Linux Kernel Improper Input Validation Vulnerability -
Action Due Jun 02, 2023 Target Vendor : Linux
Description : Linux Kernel contains an improper input validation vulnerability in the Reliable Datagram Sockets (RDS) protocol implementation that allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
Action : The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://lkml.iu.edu/hypermail/linux/kernel/1601.3/06474.html
5.0
CVE-2015-5317 - Jenkins User Interface (UI) Information Disclosure Vulnerability -
Action Due Jun 02, 2023 Target Vendor : Jenkins
Description : Jenkins User Interface (UI) contains an information disclosure vulnerability that allows users to see the names of jobs and builds otherwise inaccessible to them on the "Fingerprints" pages.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.jenkins.io/security/advisory/2015-11-11/
9.8
CVE-2016-3427 - Oracle Java SE and JRockit Unspecified Vulnerability -
Action Due Jun 02, 2023 Target Vendor : Oracle
Description : Oracle Java SE and JRockit contains an unspecified vulnerability that allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Java Management Extensions (JMX). This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.oracle.com/security-alerts/cpuapr2016v3.html
9.8
CVE-2016-8735 - Apache Tomcat Remote Code Execution Vulnerability -
Action Due Jun 02, 2023 Target Vendor : Apache
Description : Apache Tomcat contains an unspecified vulnerability that allows for remote code execution if JmxRemoteLifecycleListener is used and an attacker can reach Java Management Extension (JMX) ports. This CVE exists because this listener wasn't updated for consistency with the Oracle patched issues for CVE-2016-3427 which affected credential types.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://tomcat.apache.org/security-9.html