CISA Known Exploited Vulnerabilities (KEV)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    7.2

    HIGH
    CVE-2024-39717 - Versa Director Dangerous File Type Upload Vulnerability -

    Action Due Sep 13, 2024 Target Vendor : Versa

    Description : The Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The “Change Favicon” (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2024-39717

    Alert Date: Aug 23, 2024 | 378 days ago

    7.2

    HIGH
    CVE-2021-31196 - Microsoft Exchange Server Information Disclosure Vulnerability -

    Action Due Sep 11, 2024 Target Vendor : Microsoft

    Description : Microsoft Exchange Server contains an information disclosure vulnerability that allows for remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2021-31196; https://nvd.nist.gov/vuln/detail/CVE-2021-31196

    Alert Date: Aug 21, 2024 | 380 days ago

    8.4

    HIGH
    CVE-2022-0185 - Linux Kernel Heap-Based Buffer Overflow Vulnerability -

    Action Due Sep 11, 2024 Target Vendor : Linux

    Description : Linux kernel contains a heap-based buffer overflow vulnerability in the legacy_parse_param function in the Filesystem Context functionality. This allows an attacker to open a filesystem that does not support the Filesystem Context API and ultimately escalate privileges.

    Action : Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=722d94847de2; https://nvd.nist.gov/vuln/detail/CVE-2022-0185

    Alert Date: Aug 21, 2024 | 380 days ago

    10.0

    HIGH
    CVE-2021-33045 - Dahua IP Camera Authentication Bypass Vulnerability -

    Action Due Sep 11, 2024 Target Vendor : Dahua

    Description : Dahua IP cameras and related products contain an authentication bypass vulnerability when the loopback device is specified by the client during authentication.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33045

    Alert Date: Aug 21, 2024 | 380 days ago

    10.0

    HIGH
    CVE-2021-33044 - Dahua IP Camera Authentication Bypass Vulnerability -

    Action Due Sep 11, 2024 Target Vendor : Dahua

    Description : Dahua IP cameras and related products contain an authentication bypass vulnerability when the NetKeyboard type argument is specified by the client during authentication.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33044

    Alert Date: Aug 21, 2024 | 380 days ago

    9.8

    CRITICAL
    CVE-2024-23897 - Jenkins Command Line Interface (CLI) Path Traversal Vulnerability -

    Action Due Sep 09, 2024 Target Vendor : Jenkins

    Description : Jenkins Command Line Interface (CLI) contains a path traversal vulnerability that allows attackers limited read access to certain files, which can lead to code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314; https://nvd.nist.gov/vuln/detail/CVE-2024-23897

    Alert Date: Aug 19, 2024 | 382 days ago

    9.8

    CRITICAL
    CVE-2024-28986 - SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability -

    Action Due Sep 05, 2024 Target Vendor : SolarWinds

    Description : SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could allow for remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28986; https://nvd.nist.gov/vuln/detail/CVE-2024-28986

    Alert Date: Aug 15, 2024 | 386 days ago

    7.8

    HIGH
    CVE-2024-38107 - Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability -

    Action Due Sep 03, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to obtain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107; https://nvd.nist.gov/vuln/detail/CVE-2024-38107

    Alert Date: Aug 13, 2024 | 388 days ago

    7.0

    HIGH
    CVE-2024-38106 - Microsoft Windows Kernel Privilege Escalation Vulnerability -

    Action Due Sep 03, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows Kernel contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. Successful exploitation of this vulnerability requires an attacker to win a race condition.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106; https://nvd.nist.gov/vuln/detail/CVE-2024-38106

    Alert Date: Aug 13, 2024 | 388 days ago

    7.8

    HIGH
    CVE-2024-38193 - Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability -

    Action Due Sep 03, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193; https://nvd.nist.gov/vuln/detail/CVE-2024-38193

    Alert Date: Aug 13, 2024 | 388 days ago

    6.5

    MEDIUM
    CVE-2024-38213 - Microsoft Windows SmartScreen Security Feature Bypass Vulnerability -

    Action Due Sep 03, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience via a malicious file.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213; https://nvd.nist.gov/vuln/detail/CVE-2024-38213

    Alert Date: Aug 13, 2024 | 388 days ago

    7.5

    HIGH
    CVE-2024-38178 - Microsoft Windows Scripting Engine Memory Corruption Vulnerability -

    Action Due Sep 03, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows Scripting Engine contains a memory corruption vulnerability that allows unauthenticated attacker to initiate remote code execution via a specially crafted URL.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178; https://nvd.nist.gov/vuln/detail/CVE-2024-38178

    Alert Date: Aug 13, 2024 | 388 days ago

    8.8

    HIGH
    CVE-2024-38189 - Microsoft Project Remote Code Execution Vulnerability -

    Action Due Sep 03, 2024 Target Vendor : Microsoft

    Description : Microsoft Project contains an unspecified vulnerability that allows for remote code execution via a malicious file.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38189; https://nvd.nist.gov/vuln/detail/CVE-2024-38189

    Alert Date: Aug 13, 2024 | 388 days ago

    9.8

    CRITICAL
    CVE-2024-32113 - Apache OFBiz Path Traversal Vulnerability -

    Action Due Aug 28, 2024 Target Vendor : Apache

    Description : Apache OFBiz contains a path traversal vulnerability that could allow for remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd; https://nvd.nist.gov/vuln/detail/CVE-2024-32113

    Alert Date: Aug 07, 2024 | 394 days ago

    7.8

    HIGH
    CVE-2024-36971 - Android Kernel Remote Code Execution Vulnerability -

    Action Due Aug 28, 2024 Target Vendor : Android

    Description : Android contains an unspecified vulnerability in the kernel that allows for remote code execution. This vulnerability resides in Linux Kernel and could impact other products, including but not limited to Android OS.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2024-08-01, https://lore.kernel.org/linux-cve-announce/[email protected]/T/#u ; https://nvd.nist.gov/vuln/detail/CVE-2024-36971

    Alert Date: Aug 07, 2024 | 394 days ago

    8.8

    HIGH
    CVE-2018-0824 - Microsoft COM for Windows Deserialization of Untrusted Data Vulnerability -

    Action Due Aug 26, 2024 Target Vendor : Microsoft

    Description : Microsoft COM for Windows contains a deserialization of untrusted data vulnerability that allows for privilege escalation and remote code execution via a specially crafted file or script.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2018-0824; https://nvd.nist.gov/vuln/detail/CVE-2018-0824

    Alert Date: Aug 05, 2024 | 396 days ago

    7.2

    HIGH
    CVE-2024-37085 - VMware ESXi Authentication Bypass Vulnerability -

    Action Due Aug 20, 2024 Target Vendor : VMware

    Description : VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505; https://nvd.nist.gov/vuln/detail/CVE-2024-37085

    Alert Date: Jul 30, 2024 | 402 days ago

    9.8

    CRITICAL
    CVE-2023-45249 - Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability -

    Action Due Aug 19, 2024 Target Vendor : Acronis

    Description : Acronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security-advisory.acronis.com/advisories/SEC-6452; https://nvd.nist.gov/vuln/detail/CVE-2023-45249

    Alert Date: Jul 29, 2024 | 403 days ago

    9.8

    CRITICAL
    CVE-2024-5217 - ServiceNow Incomplete List of Disallowed Inputs Vulnerability -

    Action Due Aug 19, 2024 Target Vendor : ServiceNow

    Description : ServiceNow Washington DC, Vancouver, and earlier Now Platform releases contain an incomplete list of disallowed inputs vulnerability in the GlideExpression script. An unauthenticated user could exploit this vulnerability to execute code remotely.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313; https://nvd.nist.gov/vuln/detail/CVE-2024-5217

    Alert Date: Jul 29, 2024 | 403 days ago

    9.8

    CRITICAL
    CVE-2024-4879 - ServiceNow Improper Input Validation Vulnerability -

    Action Due Aug 19, 2024 Target Vendor : ServiceNow

    Description : ServiceNow Utah, Vancouver, and Washington DC Now releases contain a jelly template injection vulnerability in UI macros. An unauthenticated user could exploit this vulnerability to execute code remotely.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154; https://nvd.nist.gov/vuln/detail/CVE-2024-4879

    Alert Date: Jul 29, 2024 | 403 days ago
Showing 20 of 1416 Results

Filters