CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    5.3

    CVSS31
    CVE-2023-36847 - Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability -

    Action Due Nov 17, 2023 Target Vendor : Juniper

    Description : Juniper Junos OS on EX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-36847

    Alert Date: Nov 13, 2023 | 585 days ago

    5.3

    CVSS31
    CVE-2023-36846 - Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability -

    Action Due Nov 17, 2023 Target Vendor : Juniper

    Description : Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36846

    Alert Date: Nov 13, 2023 | 585 days ago

    5.3

    CVSS31
    CVE-2023-36851 - Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability -

    Action Due Nov 17, 2023 Target Vendor : Juniper

    Description : Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36851

    Alert Date: Nov 13, 2023 | 585 days ago

    7.5

    CVSS31
    CVE-2023-29552 - Service Location Protocol (SLP) Denial-of-Service Vulnerability -

    Action Due Nov 29, 2023 Target Vendor : IETF

    Description : The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor.

    Action : Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on the patching status. For more information please see https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp and https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks.; https://nvd.nist.gov/vuln/detail/CVE-2023-29552

    Alert Date: Nov 08, 2023 | 590 days ago

    9.8

    CVSS31
    CVE-2023-22518 - Atlassian Confluence Data Center and Server Improper Authorization Vulnerability -

    Action Due Nov 28, 2023 Target Vendor : Atlassian

    Description : Atlassian Confluence Data Center and Server contain an improper authorization vulnerability that can result in significant data loss when exploited by an unauthenticated attacker. There is no impact on confidentiality since the attacker cannot exfiltrate any data.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22518

    Alert Date: Nov 07, 2023 | 591 days ago

    10.0

    CVSS31
    CVE-2023-46604 - Apache ActiveMQ Deserialization of Untrusted Data Vulnerability -

    Action Due Nov 23, 2023 Target Vendor : Apache

    Description : Apache ActiveMQ contains a deserialization of untrusted data vulnerability that may allow a remote attacker with network access to a broker to run shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt; https://nvd.nist.gov/vuln/detail/CVE-2023-46604

    Alert Date: Nov 02, 2023 | 596 days ago

    8.8

    CVSS31
    CVE-2023-46748 - F5 BIG-IP Configuration Utility SQL Injection Vulnerability -

    Action Due Nov 21, 2023 Target Vendor : F5

    Description : F5 BIG-IP Configuration utility contains an SQL injection vulnerability that may allow an authenticated attacker with network access through the BIG-IP management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46747.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://my.f5.com/manage/s/article/K000137365 ; https://nvd.nist.gov/vuln/detail/CVE-2023-46748

    Alert Date: Oct 31, 2023 | 598 days ago

    9.8

    CVSS31
    CVE-2023-46747 - F5 BIG-IP Configuration Utility Authentication Bypass Vulnerability -

    Action Due Nov 21, 2023 Target Vendor : F5

    Description : F5 BIG-IP Configuration utility contains an authentication bypass using an alternate path or channel vulnerability due to undisclosed requests that may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46748.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://my.f5.com/manage/s/article/K000137353; https://nvd.nist.gov/vuln/detail/CVE-2023-46747

    Alert Date: Oct 31, 2023 | 598 days ago

    6.1

    CVSS31
    CVE-2023-5631 - Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability -

    Action Due Nov 16, 2023 Target Vendor : Roundcube

    Description : Roundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that allows a remote attacker to run malicious JavaScript code.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://roundcube.net/news/2023/10/16/security-update-1.6.4-released, https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15 ; https://nvd.nist.gov/vuln/detail/CVE-2023-5631

    Alert Date: Oct 26, 2023 | 603 days ago

    7.2

    CVSS31
    CVE-2023-20273 - Cisco IOS XE Web UI Command Injection Vulnerability -

    Action Due Oct 27, 2023 Target Vendor : Cisco

    Description : Cisco IOS XE contains a command injection vulnerability in the web user interface. When chained with CVE-2023-20198, the attacker can leverage the new local user to elevate privilege to root and write the implant to the file system. Cisco identified CVE-2023-20273 as the vulnerability exploited to deploy the implant. CVE-2021-1435, previously associated with the exploitation events, is no longer believed to be related to this activity.

    Action : Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z; https://nvd.nist.gov/vuln/detail/CVE-2023-20273

    Alert Date: Oct 23, 2023 | 606 days ago

    9.4

    CVSS31
    CVE-2023-4966 - Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability -

    Action Due Nov 08, 2023 Target Vendor : Citrix

    Description : Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for sensitive information disclosure when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.

    Action : Apply mitigations and kill all active and persistent sessions per vendor instructions [https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/] OR discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/, https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967 ; https://nvd.nist.gov/vuln/detail/CVE-2023-4966

    Alert Date: Oct 18, 2023 | 611 days ago

    10.0

    CVSS31
    CVE-2023-20198 - Cisco IOS XE Web UI Privilege Escalation Vulnerability -

    Action Due Oct 20, 2023 Target Vendor : Cisco

    Description : Cisco IOS XE Web UI contains a privilege escalation vulnerability in the web user interface that could allow a remote, unauthenticated attacker to create an account with privilege level 15 access. The attacker can then use that account to gain control of the affected device.

    Action : Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html; https://nvd.nist.gov/vuln/detail/CVE-2023-20198

    Alert Date: Oct 16, 2023 | 613 days ago

    6.6

    CVSS31
    CVE-2023-20109 - Cisco IOS and IOS XE Group Encrypted Transport VPN Out-of-Bounds Write Vulnerability -

    Action Due Oct 31, 2023 Target Vendor : Cisco

    Description : Cisco IOS and IOS XE contain an out-of-bounds write vulnerability in the Group Encrypted Transport VPN (GET VPN) feature that could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute malicious code or cause a device to crash.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-getvpn-rce-g8qR68sx; https://nvd.nist.gov/vuln/detail/CVE-2023-20109

    Alert Date: Oct 10, 2023 | 619 days ago

    5.3

    CVSS31
    CVE-2023-41763 - Microsoft Skype for Business Privilege Escalation Vulnerability -

    Action Due Oct 31, 2023 Target Vendor : Microsoft

    Description : Microsoft Skype for Business contains an unspecified vulnerability that allows for privilege escalation.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-41763; https://nvd.nist.gov/vuln/detail/CVE-2023-41763

    Alert Date: Oct 10, 2023 | 619 days ago

    6.5

    CVSS31
    CVE-2023-36563 - Microsoft WordPad Information Disclosure Vulnerability -

    Action Due Oct 31, 2023 Target Vendor : Microsoft

    Description : Microsoft WordPad contains an unspecified vulnerability that allows for information disclosure.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36563; https://nvd.nist.gov/vuln/detail/CVE-2023-36563

    Alert Date: Oct 10, 2023 | 619 days ago

    7.5

    CVSS31
    CVE-2023-44487 - HTTP/2 Rapid Reset Attack Vulnerability -

    Action Due Oct 31, 2023 Target Vendor : IETF

    Description : HTTP/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS).

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-44487

    Alert Date: Oct 10, 2023 | 619 days ago

    7.8

    CVSS31
    CVE-2023-21608 - Adobe Acrobat and Reader Use-After-Free Vulnerability -

    Action Due Oct 31, 2023 Target Vendor : Adobe

    Description : Adobe Acrobat and Reader contains a use-after-free vulnerability that allows for code execution in the context of the current user.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://helpx.adobe.com/security/products/acrobat/apsb23-01.html; https://nvd.nist.gov/vuln/detail/CVE-2023-21608

    Alert Date: Oct 10, 2023 | 619 days ago

    10.0

    CVSS31
    CVE-2023-40044 - Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability -

    Action Due Oct 26, 2023 Target Vendor : Progress

    Description : Progress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023; https://nvd.nist.gov/vuln/detail/CVE-2023-40044

    Alert Date: Oct 05, 2023 | 624 days ago

    7.8

    CVSS31
    CVE-2023-42824 - Apple iOS and iPadOS Kernel Privilege Escalation Vulnerability -

    Action Due Oct 26, 2023 Target Vendor : Apple

    Description : Apple iOS and iPadOS contain an unspecified vulnerability that allows for local privilege escalation.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT213961; https://nvd.nist.gov/vuln/detail/CVE-2023-42824

    Alert Date: Oct 05, 2023 | 624 days ago

    9.8

    CVSS31
    CVE-2023-22515 - Atlassian Confluence Data Center and Server Broken Access Control Vulnerability -

    Action Due Oct 13, 2023 Target Vendor : Atlassian

    Description : Atlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22515

    Alert Date: Oct 05, 2023 | 624 days ago
Showing 20 of 1370 Results

Filters

© cvefeed.io
Latest DB Update: Jun. 20, 2025 23:42