CISA Known Exploited Vulnerabilities Catalog
7.5
CVE-2024-38178 - Microsoft Windows Scripting Engine Memory Corruption Vulnerability -
Action Due Sep 03, 2024 Target Vendor : Microsoft
Description : Microsoft Windows Scripting Engine contains a memory corruption vulnerability that allows unauthenticated attacker to initiate remote code execution via a specially crafted URL.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178
6.5
CVE-2024-38213 - Microsoft Windows SmartScreen Security Feature Bypass Vulnerability -
Action Due Sep 03, 2024 Target Vendor : Microsoft
Description : Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience via a malicious file.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213
7.8
CVE-2024-38193 - Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability -
Action Due Sep 03, 2024 Target Vendor : Microsoft
Description : Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193
7.0
CVE-2024-38106 - Microsoft Windows Kernel Privilege Escalation Vulnerability -
Action Due Sep 03, 2024 Target Vendor : Microsoft
Description : Microsoft Windows Kernel contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. Successful exploitation of this vulnerability requires an attacker to win a race condition.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106
7.8
CVE-2024-38107 - Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability -
Action Due Sep 03, 2024 Target Vendor : Microsoft
Description : Microsoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to obtain SYSTEM privileges.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107
7.8
CVE-2024-36971 - Android Kernel Remote Code Execution Vulnerability -
Action Due Aug 28, 2024 Target Vendor : Android
Description : Android contains an unspecified vulnerability in the kernel that allows for remote code execution. This vulnerability resides in Linux Kernel and could impact other products, including but not limited to Android OS.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2024-08-01, https://lore.kernel.org/linux-cve-announce/[email protected]/T/#u
9.8
CVE-2024-32113 - Apache OFBiz Path Traversal Vulnerability -
Action Due Aug 28, 2024 Target Vendor : Apache
Description : Apache OFBiz contains a path traversal vulnerability that could allow for remote code execution.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd
8.8
CVE-2018-0824 - Microsoft COM for Windows Deserialization of Untrusted Data Vulnerability -
Action Due Aug 26, 2024 Target Vendor : Microsoft
Description : Microsoft COM for Windows contains a deserialization of untrusted data vulnerability that allows for privilege escalation and remote code execution via a specially crafted file or script.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2018-0824
7.2
CVE-2024-37085 - VMware ESXi Authentication Bypass Vulnerability -
Action Due Aug 20, 2024 Target Vendor : VMware
Description : VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Known
Notes : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505
9.8
CVE-2024-4879 - ServiceNow Improper Input Validation Vulnerability -
Action Due Aug 19, 2024 Target Vendor : ServiceNow
Description : ServiceNow Utah, Vancouver, and Washington DC Now releases contain a jelly template injection vulnerability in UI macros. An unauthenticated user could exploit this vulnerability to execute code remotely.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154
9.8
CVE-2024-5217 - ServiceNow Incomplete List of Disallowed Inputs Vulnerability -
Action Due Aug 19, 2024 Target Vendor : ServiceNow
Description : ServiceNow Washington DC, Vancouver, and earlier Now Platform releases contain an incomplete list of disallowed inputs vulnerability in the GlideExpression script. An unauthenticated user could exploit this vulnerability to execute code remotely.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313
9.8
CVE-2023-45249 - Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability -
Action Due Aug 19, 2024 Target Vendor : Acronis
Description : Acronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://security-advisory.acronis.com/advisories/SEC-6452
8.8
CVE-2012-4792 - Microsoft Internet Explorer Use-After-Free Vulnerability -
Action Due Aug 13, 2024 Target Vendor : Microsoft
Description : Microsoft Internet Explorer contains a use-after-free vulnerability that allows a remote attacker to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object.
Action : The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://learn.microsoft.com/en-us/lifecycle/products/internet-explorer-11
5.3
CVE-2024-39891 - Twilio Authy Information Disclosure Vulnerability -
Action Due Aug 13, 2024 Target Vendor : Twilio
Description : Twilio Authy contains an information disclosure vulnerability in its API that allows an unauthenticated endpoint to accept a request containing a phone number and respond with information about whether the phone number was registered with Authy.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.twilio.com/en-us/changelog/Security_Alert_Authy_App_Android_iOS
9.8
CVE-2024-34102 - Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability -
Action Due Aug 07, 2024 Target Vendor : Adobe
Description : Adobe Commerce and Magento Open Source contain an improper restriction of XML external entity reference (XXE) vulnerability that allows for remote code execution.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://helpx.adobe.com/security/products/magento/apsb24-40.html
8.6
CVE-2024-28995 - SolarWinds Serv-U Path Traversal Vulnerability -
Action Due Aug 07, 2024 Target Vendor : SolarWinds
Description : SolarWinds Serv-U contains a path traversal vulnerability that allows an attacker access to read sensitive files on the host machine.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995
6.5
CVE-2022-22948 - VMware vCenter Server Incorrect Default File Permissions Vulnerability -
Action Due Aug 07, 2024 Target Vendor : VMware
Description : VMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.vmware.com/security/advisories/VMSA-2022-0009.html
9.8
CVE-2024-36401 - OSGeo GeoServer GeoTools Eval Injection Vulnerability -
Action Due Aug 05, 2024 Target Vendor : OSGeo
Description : OSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv, https://github.com/geotools/geotools/pull/4797
9.8
CVE-2024-23692 - Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability -
Action Due Jul 30, 2024 Target Vendor : Rejetto
Description : Rejetto HTTP File Server contains an improper neutralization of special elements used in a template engine vulnerability. This allows a remote, unauthenticated attacker to execute commands on the affected system by sending a specially crafted HTTP request.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : The patched Rejetto HTTP File Server (HFS) is version 3: https://github.com/rejetto/hfs?tab=readme-ov-file#installation, https://www.rejetto.com/hfs/
7.8
CVE-2024-38080 - Microsoft Windows Hyper-V Privilege Escalation Vulnerability -
Action Due Jul 30, 2024 Target Vendor : Microsoft
Description : Microsoft Windows Hyper-V contains a privilege escalation vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38080