CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    7.5

    CVSS31
    CVE-2021-31010 - Apple iOS, macOS, watchOS Sandbox Bypass Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : Apple

    Description : In affected versions of Apple iOS, macOS, and watchOS, a sandboxed process may be able to circumvent sandbox restrictions.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT212804, https://support.apple.com/en-us/HT212805, https://support.apple.com/en-us/HT212806, https://support.apple.com/en-us/HT212807, https://support.apple.com/en-us/HT212824

    Alert Date: Aug 25, 2022 | 820 days ago

    7.5

    CVSS31
    CVE-2020-36193 - PEAR Archive_Tar Improper Link Resolution Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : PEAR

    Description : PEAR Archive_Tar Tar.php allows write operations with directory traversal due to inadequate checking of symbolic links. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916, https://www.drupal.org/sa-core-2021-001, https://access.redhat.com/security/cve/cve-2020-36193

    Alert Date: Aug 25, 2022 | 820 days ago

    7.8

    CVSS31
    CVE-2020-28949 - PEAR Archive_Tar Deserialization of Untrusted Data Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : PEAR

    Description : PEAR Archive_Tar allows an unserialization attack because phar: is blocked but PHAR: is not blocked. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://pear.php.net/bugs/bug.php?id=27002, https://www.drupal.org/sa-core-2020-013, https://access.redhat.com/security/cve/cve-2020-28949

    Alert Date: Aug 25, 2022 | 820 days ago

    8.6

    CVSS31
    CVE-2022-0028 - Palo Alto Networks PAN-OS Reflected Amplification Denial-of-Service Vulnerability -

    Action Due Sep 12, 2022 Target Vendor : Palo Alto Networks

    Description : A Palo Alto Networks PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.paloaltonetworks.com/CVE-2022-0028

    Alert Date: Aug 22, 2022 | 823 days ago

    10.0

    CVSS31
    CVE-2022-22536 - SAP Multiple Products HTTP Request Smuggling Vulnerability -

    Action Due Sep 08, 2022 Target Vendor : SAP

    Description : SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server and SAP Web Dispatcher allow HTTP request smuggling. An unauthenticated attacker can prepend a victim's request with arbitrary data, allowing for function execution impersonating the victim or poisoning intermediary Web caches.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : SAP users must have an account in order to login and access the patch. https://accounts.sap.com/saml2/idp/sso

    Alert Date: Aug 18, 2022 | 827 days ago

    7.8

    CVSS31
    CVE-2022-32894 - Apple iOS and macOS Out-of-Bounds Write Vulnerability -

    Action Due Sep 08, 2022 Target Vendor : Apple

    Description : Apple iOS and macOS contain an out-of-bounds write vulnerability that could allow an application to execute code with kernel privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413

    Alert Date: Aug 18, 2022 | 827 days ago

    8.8

    CVSS31
    CVE-2022-32893 - Apple iOS and macOS Out-of-Bounds Write Vulnerability -

    Action Due Sep 08, 2022 Target Vendor : Apple

    Description : Apple iOS and macOS contain an out-of-bounds write vulnerability that could allow for remote code execution when processing malicious crafted web content.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413

    Alert Date: Aug 18, 2022 | 827 days ago

    6.5

    CVSS31
    CVE-2022-2856 - Google Chromium Intents Insufficient Input Validation Vulnerability -

    Action Due Sep 08, 2022 Target Vendor : Google

    Description : Google Chromium Intents contains an insufficient validation of untrusted input vulnerability that allows a remote attacker to browse to a malicious website via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html

    Alert Date: Aug 18, 2022 | 827 days ago

    8.8

    CVSS31
    CVE-2022-26923 - Microsoft Active Directory Domain Services Privilege Escalation Vulnerability -

    Action Due Sep 08, 2022 Target Vendor : Microsoft

    Description : An authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow for privilege escalation to SYSTEM.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26923

    Alert Date: Aug 18, 2022 | 827 days ago

    7.8

    CVSS31
    CVE-2022-21971 - Microsoft Windows Runtime Remote Code Execution Vulnerability -

    Action Due Sep 08, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows Runtime contains an unspecified vulnerability that allows for remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21971

    Alert Date: Aug 18, 2022 | 827 days ago

    9.8

    CVSS31
    CVE-2017-15944 - Palo Alto Networks PAN-OS Remote Code Execution Vulnerability -

    Action Due Sep 08, 2022 Target Vendor : Palo Alto Networks

    Description : Palo Alto Networks PAN-OS contains multiple, unspecified vulnerabilities which can allow for remote code execution when chained.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.paloaltonetworks.com/CVE-2017-15944

    Alert Date: Aug 18, 2022 | 827 days ago

    7.2

    CVSS31
    CVE-2022-27925 - Zimbra Collaboration (ZCS) Arbitrary File Upload Vulnerability -

    Action Due Sep 01, 2022 Target Vendor : Zimbra

    Description : Zimbra Collaboration (ZCS) contains flaw in the mboximport functionality, allowing an authenticated attacker to upload arbitrary files to perform remote code execution. This vulnerability was chained with CVE-2022-37042 which allows for unauthenticated remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://blog.zimbra.com/2022/08/authentication-bypass-in-mailboximportservlet-vulnerability/

    Alert Date: Aug 11, 2022 | 834 days ago

    9.8

    CVSS31
    CVE-2022-37042 - Zimbra Collaboration (ZCS) Authentication Bypass Vulnerability -

    Action Due Sep 01, 2022 Target Vendor : Zimbra

    Description : Zimbra Collaboration (ZCS) contains an authentication bypass vulnerability in MailboxImportServlet. This vulnerability was chained with CVE-2022-27925 which allows for unauthenticated remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://blog.zimbra.com/2022/08/authentication-bypass-in-mailboximportservlet-vulnerability/

    Alert Date: Aug 11, 2022 | 834 days ago

    7.8

    CVSS31
    CVE-2022-34713 - Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability -

    Action Due Aug 30, 2022 Target Vendor : Microsoft

    Description : A remote code execution vulnerability exists when Microsoft Windows MSDT is called using the URL protocol from a calling application.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713

    Alert Date: Aug 09, 2022 | 836 days ago

    7.5

    CVSS31
    CVE-2022-30333 - RARLAB UnRAR Directory Traversal Vulnerability -

    Action Due Aug 30, 2022 Target Vendor : RARLAB

    Description : RARLAB UnRAR on Linux and UNIX contains a directory traversal vulnerability, allowing an attacker to write to files during an extract (unpack) operation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : Vulnerability updated with version 6.12. Accessing link will download update information: https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz

    Alert Date: Aug 09, 2022 | 836 days ago

    7.5

    CVSS31
    CVE-2022-27924 - Zimbra Collaboration (ZCS) Command Injection Vulnerability -

    Action Due Aug 25, 2022 Target Vendor : Zimbra

    Description : Zimbra Collaboration (ZCS) allows an attacker to inject memcache commands into a targeted instance which causes an overwrite of arbitrary cached entries.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P24.1#Security_Fixes

    Alert Date: Aug 04, 2022 | 841 days ago

    9.8

    CVSS31
    CVE-2022-26138 - Atlassian Questions For Confluence App Hard-coded Credentials Vulnerability -

    Action Due Aug 19, 2022 Target Vendor : Atlassian

    Description : Atlassian Questions For Confluence App has hard-coded credentials, exposing the username and password in plaintext. A remote unauthenticated attacker can use these credentials to log into Confluence and access all content accessible to users in the confluence-users group.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://confluence.atlassian.com/doc/questions-for-confluence-security-advisory-2022-07-20-1142446709.html

    Alert Date: Jul 29, 2022 | 847 days ago

    7.8

    CVSS31
    CVE-2022-22047 - Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability -

    Action Due Aug 02, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows CSRSS contains an unspecified vulnerability that allows for privilege escalation to SYSTEM privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22047

    Alert Date: Jul 12, 2022 | 864 days ago

    8.1

    CVSS31
    CVE-2022-26925 - Microsoft Windows LSA Spoofing Vulnerability -

    Action Due Jul 22, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows Local Security Authority (LSA) contains a spoofing vulnerability where an attacker can coerce the domain controller to authenticate to the attacker using NTLM.

    Action : Apply remediation actions outlined in CISA guidance [https://www.cisa.gov/guidance-applying-june-microsoft-patch].

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : WARNING: This update is required on all Microsoft Windows endpoints but if deployed to domain controllers without additional configuration changes the update breaks PIV/CAC authentication. Read CISA implementation guidance carefully before deploying to domain controllers.

    Alert Date: Jul 01, 2022 | 875 days ago

    9.8

    CVSS31
    CVE-2022-29499 - Mitel MiVoice Connect Data Validation Vulnerability -

    Action Due Jul 18, 2022 Target Vendor : Mitel

    Description : The Service Appliance component in Mitel MiVoice Connect allows remote code execution due to incorrect data validation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Jun 27, 2022 | 879 days ago
Showing 20 of 1224 Results

Filters

© cvefeed.io
Latest DB Update: Nov. 22, 2024 20:09