CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    8.8

    CVSS31
    CVE-2024-40891 - Zyxel DSL CPE OS Command Injection Vulnerability -

    Action Due Mar 04, 2025 Target Vendor : Zyxel

    Description : Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authenticated attacker to execute OS commands via Telnet.

    Action : The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https://www.zyxel.com/service-provider/global/en/security-advisories/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40891

    Alert Date: Feb 11, 2025 | 129 days ago

    8.8

    CVSS31
    CVE-2024-40890 - Zyxel DSL CPE OS Command Injection Vulnerability -

    Action Due Mar 04, 2025 Target Vendor : Zyxel

    Description : Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the CGI program that could allow an authenticated attacker to execute OS commands via a crafted HTTP request.

    Action : The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https://www.zyxel.com/service-provider/global/en/security-advisories/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40890

    Alert Date: Feb 11, 2025 | 129 days ago

    7.8

    CVSS31
    CVE-2025-21418 - Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability -

    Action Due Mar 04, 2025 Target Vendor : Microsoft

    Description : Microsoft Windows Ancillary Function Driver for WinSock contains a heap-based buffer overflow vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21418

    Alert Date: Feb 11, 2025 | 129 days ago

    7.1

    CVSS31
    CVE-2025-21391 - Microsoft Windows Storage Link Following Vulnerability -

    Action Due Mar 04, 2025 Target Vendor : Microsoft

    Description : Microsoft Windows Storage contains a link following vulnerability that could allow for privilege escalation. This vulnerability could allow an attacker to delete data including data that results in the service being unavailable.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21391 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21391

    Alert Date: Feb 11, 2025 | 129 days ago

    8.8

    CVSS31
    CVE-2025-0994 - Trimble Cityworks Deserialization Vulnerability -

    Action Due Feb 28, 2025 Target Vendor : Trimble

    Description : Trimble Cityworks contains a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer's Microsoft Internet Information Services (IIS) web server.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://learn.assetlifecycle.trimble.com/i/1532182-cityworks-customer-communication-2025-02-05-docx/0?; https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-04 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0994

    Alert Date: Feb 07, 2025 | 133 days ago

    9.8

    CVSS31
    CVE-2020-15069 - Sophos XG Firewall Buffer Overflow Vulnerability -

    Action Due Feb 27, 2025 Target Vendor : Sophos

    Description : Sophos XG Firewall contains a buffer overflow vulnerability that allows for remote code execution via the "HTTP/S bookmark" feature.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://community.sophos.com/b/security-blog/posts/advisory-buffer-overflow-vulnerability-in-user-portal ; https://nvd.nist.gov/vuln/detail/CVE-2020-15069

    Alert Date: Feb 06, 2025 | 134 days ago

    9.8

    CVSS31
    CVE-2020-29574 - CyberoamOS (CROS) SQL Injection Vulnerability -

    Action Due Feb 27, 2025 Target Vendor : Sophos

    Description : CyberoamOS (CROS) contains a SQL injection vulnerability in the WebAdmin that allows an unauthenticated attacker to execute arbitrary SQL statements remotely.

    Action : The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.sophos.com/support/s/article/KBA-000007526 ; https://nvd.nist.gov/vuln/detail/CVE-2020-29574

    Alert Date: Feb 06, 2025 | 134 days ago

    9.8

    CVSS31
    CVE-2024-21413 - Microsoft Outlook Improper Input Validation Vulnerability -

    Action Due Feb 27, 2025 Target Vendor : Microsoft

    Description : Microsoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21413 ; https://nvd.nist.gov/vuln/detail/CVE-2024-21413

    Alert Date: Feb 06, 2025 | 134 days ago

    7.8

    CVSS31
    CVE-2022-23748 - Dante Discovery Process Control Vulnerability -

    Action Due Feb 27, 2025 Target Vendor : Audinate

    Description : Dante Discovery contains a process control vulnerability in mDNSResponder.exe that all allows for a DLL sideloading attack. A local attacker can leverage this vulnerability in the Dante Application Library to execute arbitrary code.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.getdante.com/support/faq/audinate-response-to-dante-discovery-mdnsresponder-exe-security-issue-cve-2022-23748/ ; https://nvd.nist.gov/vuln/detail/CVE-2022-23748

    Alert Date: Feb 06, 2025 | 134 days ago

    7.0

    CVSS31
    CVE-2025-0411 - 7-Zip Mark of the Web Bypass Vulnerability -

    Action Due Feb 27, 2025 Target Vendor : 7-Zip

    Description : 7-Zip contains a protection mechanism failure vulnerability that allows remote attackers to bypass the Mark-of-the-Web security feature to execute arbitrary code in the context of the current user.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.7-zip.org/history.txt ; https://nvd.nist.gov/vuln/detail/CVE-2025-0411

    Alert Date: Feb 06, 2025 | 134 days ago

    7.8

    CVSS31
    CVE-2024-53104 - Linux Kernel Out-of-Bounds Write Vulnerability -

    Action Due Feb 26, 2025 Target Vendor : Linux

    Description : Linux kernel contains an out-of-bounds write vulnerability in the uvc_parse_streaming component of the USB Video Class (UVC) driver that could allow for physical escalation of privilege.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://lore.kernel.org/linux-cve-announce/2024120232-CVE-2024-53104-d781@gregkh/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-53104

    Alert Date: Feb 05, 2025 | 135 days ago

    9.8

    CVSS31
    CVE-2018-19410 - Paessler PRTG Network Monitor Local File Inclusion Vulnerability -

    Action Due Feb 25, 2025 Target Vendor : Paessler

    Description : Paessler PRTG Network Monitor contains a local file inclusion vulnerability that allows a remote, unauthenticated attacker to create users with read-write privileges (including administrator).

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.paessler.com/prtg/history/prtg-18#18.2.41.1652 ; https://nvd.nist.gov/vuln/detail/CVE-2018-19410

    Alert Date: Feb 04, 2025 | 136 days ago

    7.2

    CVSS31
    CVE-2018-9276 - Paessler PRTG Network Monitor OS Command Injection Vulnerability -

    Action Due Feb 25, 2025 Target Vendor : Paessler

    Description : Paessler PRTG Network Monitor contains an OS command injection vulnerability that allows an attacker with administrative privileges to execute commands via the PRTG System Administrator web console.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.paessler.com/prtg/history/prtg-18#18.2.39 ; https://nvd.nist.gov/vuln/detail/CVE-2018-9276

    Alert Date: Feb 04, 2025 | 136 days ago

    7.5

    CVSS31
    CVE-2024-29059 - Microsoft .NET Framework Information Disclosure Vulnerability -

    Action Due Feb 25, 2025 Target Vendor : Microsoft

    Description : Microsoft .NET Framework contains an information disclosure vulnerability that exposes the ObjRef URI to an attacker, ultimately enabling remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29059

    Alert Date: Feb 04, 2025 | 136 days ago

    9.8

    CVSS31
    CVE-2024-45195 - Apache OFBiz Forced Browsing Vulnerability -

    Action Due Feb 25, 2025 Target Vendor : Apache

    Description : Apache OFBiz contains a forced browsing vulnerability that allows a remote attacker to obtain unauthorized access.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://ofbiz.apache.org/security.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-45195

    Alert Date: Feb 04, 2025 | 136 days ago

    7.8

    CVSS31
    CVE-2025-24085 - Apple Multiple Products Use-After-Free Vulnerability -

    Action Due Feb 19, 2025 Target Vendor : Apple

    Description : Apple iOS, macOS, and other Apple products contain a user-after-free vulnerability that could allow a malicious application to elevate privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/122066 ; https://support.apple.com/en-us/122068 ; https://support.apple.com/en-us/122071 ; https://support.apple.com/en-us/122072 ; https://support.apple.com/en-us/122073 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24085

    Alert Date: Jan 29, 2025 | 142 days ago

    9.8

    CVSS31
    CVE-2025-23006 - SonicWall SMA1000 Appliances Deserialization Vulnerability -

    Action Due Feb 14, 2025 Target Vendor : SonicWall

    Description : SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) contain a deserialization of untrusted data vulnerability, which can enable a remote, unauthenticated attacker to execute arbitrary OS commands.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002 ; https://nvd.nist.gov/vuln/detail/CVE-2025-23006

    Alert Date: Jan 24, 2025 | 147 days ago

    6.9

    CVSS31
    CVE-2020-11023 - JQuery Cross-Site Scripting (XSS) Vulnerability -

    Action Due Feb 13, 2025 Target Vendor : JQuery

    Description : JQuery contains a persistent cross-site scripting (XSS) vulnerability. When passing maliciously formed, untrusted input enclosed in HTML tags, JQuery's DOM manipulators can execute untrusted code in the context of the user's browser.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2020-11023

    Alert Date: Jan 23, 2025 | 148 days ago

    10.0

    CVSS31
    CVE-2024-50603 - Aviatrix Controllers OS Command Injection Vulnerability -

    Action Due Feb 06, 2025 Target Vendor : Aviatrix

    Description : Aviatrix Controllers contain an OS command injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://docs.aviatrix.com/documentation/latest/release-notices/psirt-advisories/psirt-advisories.html?expand=true ; https://nvd.nist.gov/vuln/detail/CVE-2024-50603

    Alert Date: Jan 16, 2025 | 155 days ago

    7.8

    CVSS31
    CVE-2025-21335 - Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability -

    Action Due Feb 04, 2025 Target Vendor : Microsoft

    Description : Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21335 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21335

    Alert Date: Jan 14, 2025 | 157 days ago
Showing 20 of 1370 Results

Filters

© cvefeed.io
Latest DB Update: Jun. 20, 2025 10:25