CISA Known Exploited Vulnerabilities Catalog
7.5
CVE-2021-20124 - Draytek VigorConnect Path Traversal Vulnerability -
Action Due Sep 24, 2024 Target Vendor : DrayTek
Description : Draytek VigorConnect contains a path traversal vulnerability in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.draytek.com/about/security-advisory/vigorconnect-software-security-vulnerability-(cve-2021-20123-cve-2021-20129)
7.8
CVE-2024-7262 - Kingsoft WPS Office Path Traversal Vulnerability -
Action Due Sep 24, 2024 Target Vendor : Kingsoft
Description : Kingsoft WPS Office contains a path traversal vulnerability in promecefpluginhost.exe on Windows that allows an attacker to load an arbitrary Windows library.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : While CISA cannot confirm the effectiveness of patches at this time, it is recommended that mitigations be applied per vendor instructions if available. If these instructions cannot be located or if mitigations are unavailable, discontinue the use of the product.
8.8
CVE-2024-7965 - Google Chromium V8 Inappropriate Implementation Vulnerability -
Action Due Sep 18, 2024 Target Vendor : Google
Description : Google Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html
9.8
CVE-2024-38856 - Apache OFBiz Incorrect Authorization Vulnerability -
Action Due Sep 17, 2024 Target Vendor : Apache
Description : Apache OFBiz contains an incorrect authorization vulnerability that could allow remote code execution via a Groovy payload in the context of the OFBiz user process by an unauthenticated attacker.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/[email protected]:lte=1M:CVE-2024-38856
8.8
CVE-2024-7971 - Google Chromium V8 Type Confusion Vulnerability -
Action Due Sep 16, 2024 Target Vendor : Google
Description : Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html
7.2
CVE-2024-39717 - Versa Director Dangerous File Type Upload Vulnerability -
Action Due Sep 13, 2024 Target Vendor : Versa
Description : The Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The “Change Favicon” (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : Customers may download the update from the vendor at following link (note, a customer account is required): https://support.versa-networks.com/support/solutions/articles/23000026724-versa-director-ha-port-exploit-discovery-remediation
9.8
CVE-2021-33044 - Dahua IP Camera Authentication Bypass Vulnerability -
Action Due Sep 11, 2024 Target Vendor : Dahua
Description : Dahua IP cameras and related products contain an authentication bypass vulnerability when the NetKeyboard type argument is specified by the client during authentication.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582
9.8
CVE-2021-33045 - Dahua IP Camera Authentication Bypass Vulnerability -
Action Due Sep 11, 2024 Target Vendor : Dahua
Description : Dahua IP cameras and related products contain an authentication bypass vulnerability when the loopback device is specified by the client during authentication.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582
8.4
CVE-2022-0185 - Linux Kernel Heap-Based Buffer Overflow -
Action Due Sep 11, 2024 Target Vendor : Linux
Description : Linux kernel contains a heap-based buffer overflow vulnerability in the legacy_parse_param function in the Filesystem Context functionality. This allows an attacker to open a filesystem that does not support the Filesystem Context API and ultimately escalate privileges.
Action : Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=722d94847de2
7.2
CVE-2021-31196 - Microsoft Exchange Server Information Disclosure Vulnerability -
Action Due Sep 11, 2024 Target Vendor : Microsoft
Description : Microsoft Exchange Server contains an information disclosure vulnerability that allows for remote code execution.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2021-31196
9.8
CVE-2024-23897 - Jenkins Command Line Interface (CLI) Path Traversal Vulnerability -
Action Due Sep 09, 2024 Target Vendor : Jenkins
Description : Jenkins Command Line Interface (CLI) contains a path traversal vulnerability that allows attackers limited read access to certain files, which can lead to code execution.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314
9.8
CVE-2024-28986 - SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability -
Action Due Sep 05, 2024 Target Vendor : SolarWinds
Description : SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could allow for remote code execution.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28986
8.8
CVE-2024-38189 - Microsoft Project Remote Code Execution Vulnerability -
Action Due Sep 03, 2024 Target Vendor : Microsoft
Description : Microsoft Project contains an unspecified vulnerability that allows for remote code execution via a malicious file.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38189
7.5
CVE-2024-38178 - Microsoft Windows Scripting Engine Memory Corruption Vulnerability -
Action Due Sep 03, 2024 Target Vendor : Microsoft
Description : Microsoft Windows Scripting Engine contains a memory corruption vulnerability that allows unauthenticated attacker to initiate remote code execution via a specially crafted URL.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178
6.5
CVE-2024-38213 - Microsoft Windows SmartScreen Security Feature Bypass Vulnerability -
Action Due Sep 03, 2024 Target Vendor : Microsoft
Description : Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience via a malicious file.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213
7.8
CVE-2024-38193 - Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability -
Action Due Sep 03, 2024 Target Vendor : Microsoft
Description : Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193
7.0
CVE-2024-38106 - Microsoft Windows Kernel Privilege Escalation Vulnerability -
Action Due Sep 03, 2024 Target Vendor : Microsoft
Description : Microsoft Windows Kernel contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. Successful exploitation of this vulnerability requires an attacker to win a race condition.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106
7.8
CVE-2024-38107 - Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability -
Action Due Sep 03, 2024 Target Vendor : Microsoft
Description : Microsoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to obtain SYSTEM privileges.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107
7.8
CVE-2024-36971 - Android Kernel Remote Code Execution Vulnerability -
Action Due Aug 28, 2024 Target Vendor : Android
Description : Android contains an unspecified vulnerability in the kernel that allows for remote code execution. This vulnerability resides in Linux Kernel and could impact other products, including but not limited to Android OS.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2024-08-01, https://lore.kernel.org/linux-cve-announce/[email protected]/T/#u
9.8
CVE-2024-32113 - Apache OFBiz Path Traversal Vulnerability -
Action Due Aug 28, 2024 Target Vendor : Apache
Description : Apache OFBiz contains a path traversal vulnerability that could allow for remote code execution.
Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd