CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    8.8

    CVSS31
    CVE-2023-41993 - Apple Multiple Products WebKit Code Execution Vulnerability -

    Action Due Oct 16, 2023 Target Vendor : Apple

    Description : Apple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213930; https://nvd.nist.gov/vuln/detail/CVE-2023-41993

    Alert Date: Sep 25, 2023 | 659 days ago

    7.2

    CVSS31
    CVE-2023-41179 - Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability -

    Action Due Oct 12, 2023 Target Vendor : Trend Micro

    Description : Trend Micro Apex One and Worry-Free Business Security contain an unspecified vulnerability in the third-party anti-virus uninstaller that could allow an attacker to manipulate the module to conduct remote code execution. An attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://success.trendmicro.com/dcx/s/solution/000294994?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-41179

    Alert Date: Sep 21, 2023 | 663 days ago

    8.8

    CVSS31
    CVE-2023-28434 - MinIO Security Feature Bypass Vulnerability -

    Action Due Oct 10, 2023 Target Vendor : MinIO

    Description : MinIO contains a security feature bypass vulnerability that allows an attacker to use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket` to conduct privilege escalation. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c; https://nvd.nist.gov/vuln/detail/CVE-2023-28434

    Alert Date: Sep 19, 2023 | 665 days ago

    7.8

    CVSS31
    CVE-2022-22265 - Samsung Mobile Devices Use-After-Free Vulnerability -

    Action Due Oct 09, 2023 Target Vendor : Samsung

    Description : Samsung devices with selected Exynos chipsets contain a use-after-free vulnerability that allows malicious memory write and code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1; https://nvd.nist.gov/vuln/detail/CVE-2022-22265

    Alert Date: Sep 18, 2023 | 666 days ago

    9.8

    CVSS31
    CVE-2014-8361 - Realtek SDK Improper Input Validation Vulnerability -

    Action Due Oct 09, 2023 Target Vendor : Realtek

    Description : Realtek SDK contains an improper input validation vulnerability in the miniigd SOAP service that allows remote attackers to execute malicious code via a crafted NewInternalClient request.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://web.archive.org/web/20150831100501/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055; https://nvd.nist.gov/vuln/detail/CVE-2014-8361

    Alert Date: Sep 18, 2023 | 666 days ago

    9.8

    CVSS31
    CVE-2021-3129 - Laravel Ignition File Upload Vulnerability -

    Action Due Oct 09, 2023 Target Vendor : Laravel

    Description : Laravel Ignition contains a file upload vulnerability that allows unauthenticated remote attackers to execute malicious code due to insecure usage of file_get_contents() and file_put_contents().

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://github.com/facade/ignition/releases/tag/2.5.2; https://nvd.nist.gov/vuln/detail/CVE-2021-3129

    Alert Date: Sep 18, 2023 | 666 days ago

    8.8

    CVSS31
    CVE-2017-6884 - Zyxel EMG2926 Routers Command Injection Vulnerability -

    Action Due Oct 09, 2023 Target Vendor : Zyxel

    Description : Zyxel EMG2926 routers contain a command injection vulnerability located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute malicious commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-vulnerability-in-emg2926-q10a-ethernet-cpe, https://www.zyxelguard.com/Zyxel-EOL.asp; https://nvd.nist.gov/vuln/detail/CVE-2017-6884

    Alert Date: Sep 18, 2023 | 666 days ago

    7.8

    CVSS31
    CVE-2023-26369 - Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability -

    Action Due Oct 05, 2023 Target Vendor : Adobe

    Description : Adobe Acrobat and Reader contains an out-of-bounds write vulnerability that allows for code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://helpx.adobe.com/security/products/acrobat/apsb23-34.html; https://nvd.nist.gov/vuln/detail/CVE-2023-26369

    Alert Date: Sep 14, 2023 | 670 days ago

    7.8

    CVSS31
    CVE-2023-35674 - Android Framework Privilege Escalation Vulnerability -

    Action Due Oct 04, 2023 Target Vendor : Android

    Description : Android Framework contains an unspecified vulnerability that allows for privilege escalation.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://source.android.com/docs/security/bulletin/2023-09-01; https://nvd.nist.gov/vuln/detail/CVE-2023-35674

    Alert Date: Sep 13, 2023 | 671 days ago

    8.8

    CVSS31
    CVE-2023-4863 - Google Chromium WebP Heap-Based Buffer Overflow Vulnerability -

    Action Due Oct 04, 2023 Target Vendor : Google

    Description : Google Chromium WebP contains a heap-based buffer overflow vulnerability that allows a remote attacker to perform an out-of-bounds memory write via a crafted HTML page. This vulnerability can affect applications that use the WebP Codec.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2023-4863

    Alert Date: Sep 13, 2023 | 671 days ago

    9.1

    CVSS31
    CVE-2023-20269 - Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability -

    Action Due Oct 04, 2023 Target Vendor : Cisco

    Description : Cisco Adaptive Security Appliance and Firepower Threat Defense contain an unauthorized access vulnerability that could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or establish a clientless SSL VPN session with an unauthorized user.

    Action : Apply mitigations per vendor instructions for group-lock and vpn-simultaneous-logins or discontinue use of the product for unsupported devices.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC; https://nvd.nist.gov/vuln/detail/CVE-2023-20269

    Alert Date: Sep 13, 2023 | 671 days ago

    6.5

    CVSS31
    CVE-2023-36761 - Microsoft Word Information Disclosure Vulnerability -

    Action Due Oct 03, 2023 Target Vendor : Microsoft

    Description : Microsoft Word contains an unspecified vulnerability that allows for information disclosure.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761; https://nvd.nist.gov/vuln/detail/CVE-2023-36761

    Alert Date: Sep 12, 2023 | 672 days ago

    7.8

    CVSS31
    CVE-2023-36802 - Microsoft Streaming Service Proxy Privilege Escalation Vulnerability -

    Action Due Oct 03, 2023 Target Vendor : Microsoft

    Description : Microsoft Streaming Service Proxy contains an unspecified vulnerability that allows for privilege escalation.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802; https://nvd.nist.gov/vuln/detail/CVE-2023-36802

    Alert Date: Sep 12, 2023 | 672 days ago

    7.8

    CVSS31
    CVE-2023-41064 - Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability -

    Action Due Oct 02, 2023 Target Vendor : Apple

    Description : Apple iOS, iPadOS, and macOS contain a buffer overflow vulnerability in ImageIO when processing a maliciously crafted image, which may lead to code execution. This vulnerability was chained with CVE-2023-41061.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT213905, https://support.apple.com/en-us/HT213906; https://nvd.nist.gov/vuln/detail/CVE-2023-41064

    Alert Date: Sep 11, 2023 | 673 days ago

    7.8

    CVSS31
    CVE-2023-41061 - Apple iOS, iPadOS, and watchOS Wallet Code Execution Vulnerability -

    Action Due Oct 02, 2023 Target Vendor : Apple

    Description : Apple iOS, iPadOS, and watchOS contain an unspecified vulnerability due to a validation issue affecting Wallet in which a maliciously crafted attachment may result in code execution. This vulnerability was chained with CVE-2023-41064.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT213905, https://support.apple.com/kb/HT213907; https://nvd.nist.gov/vuln/detail/CVE-2023-41061

    Alert Date: Sep 11, 2023 | 673 days ago

    9.8

    CVSS31
    CVE-2023-33246 - Apache RocketMQ Command Execution Vulnerability -

    Action Due Sep 27, 2023 Target Vendor : Apache

    Description : Several components of Apache RocketMQ, including NameServer, Broker, and Controller, are exposed to the extranet and lack permission verification. An attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as or achieve the same effect by forging the RocketMQ protocol content.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp; https://nvd.nist.gov/vuln/detail/CVE-2023-33246

    Alert Date: Sep 06, 2023 | 678 days ago

    8.6

    CVSS31
    CVE-2023-32315 - Ignite Realtime Openfire Path Traversal Vulnerability -

    Action Due Sep 14, 2023 Target Vendor : Ignite Realtime

    Description : Ignite Realtime Openfire contains a path traversal vulnerability that allows an unauthenticated attacker to access restricted pages in the Openfire Admin Console reserved for administrative users.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.igniterealtime.org/downloads/#openfire; https://nvd.nist.gov/vuln/detail/CVE-2023-32315

    Alert Date: Aug 24, 2023 | 691 days ago

    7.8

    CVSS31
    CVE-2023-38831 - RARLAB WinRAR Code Execution Vulnerability -

    Action Due Sep 14, 2023 Target Vendor : RARLAB

    Description : RARLAB WinRAR contains an unspecified vulnerability that allows an attacker to execute code when a user attempts to view a benign file within a ZIP archive.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : http://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=232&cHash=c5bf79590657e32554c6683296a8e8aa; https://nvd.nist.gov/vuln/detail/CVE-2023-38831

    Alert Date: Aug 24, 2023 | 691 days ago

    7.5

    CVSS31
    CVE-2023-27532 - Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability -

    Action Due Sep 12, 2023 Target Vendor : Veeam

    Description : Veeam Backup & Replication Cloud Connect component contains a missing authentication for critical function vulnerability that allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker gaining access to the backup infrastructure hosts.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.veeam.com/kb4424; https://nvd.nist.gov/vuln/detail/CVE-2023-27532

    Alert Date: Aug 22, 2023 | 693 days ago

    9.8

    CVSS31
    CVE-2023-38035 - Ivanti Sentry Authentication Bypass Vulnerability -

    Action Due Sep 12, 2023 Target Vendor : Ivanti

    Description : Ivanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability that may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-38035

    Alert Date: Aug 22, 2023 | 693 days ago
Showing 20 of 1383 Results

Filters

© cvefeed.io
Latest DB Update: Jul. 15, 2025 3:31