CISA Known Exploited Vulnerabilities (KEV)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    6.5

    MEDIUM
    CVE-2023-36563 - Microsoft WordPad Information Disclosure Vulnerability -

    Action Due Oct 31, 2023 Target Vendor : Microsoft

    Description : Microsoft WordPad contains an unspecified vulnerability that allows for information disclosure.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36563; https://nvd.nist.gov/vuln/detail/CVE-2023-36563

    Alert Date: Oct 10, 2023 | 699 days ago

    7.5

    HIGH
    CVE-2023-44487 - HTTP/2 Rapid Reset Attack Vulnerability -

    Action Due Oct 31, 2023 Target Vendor : IETF

    Description : HTTP/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS).

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-44487

    Alert Date: Oct 10, 2023 | 699 days ago

    7.8

    HIGH
    CVE-2023-21608 - Adobe Acrobat and Reader Use-After-Free Vulnerability -

    Action Due Oct 31, 2023 Target Vendor : Adobe

    Description : Adobe Acrobat and Reader contains a use-after-free vulnerability that allows for code execution in the context of the current user.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://helpx.adobe.com/security/products/acrobat/apsb23-01.html; https://nvd.nist.gov/vuln/detail/CVE-2023-21608

    Alert Date: Oct 10, 2023 | 699 days ago

    10.0

    CRITICAL
    CVE-2023-40044 - Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability -

    Action Due Oct 26, 2023 Target Vendor : Progress

    Description : Progress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023; https://nvd.nist.gov/vuln/detail/CVE-2023-40044

    Alert Date: Oct 05, 2023 | 704 days ago

    7.8

    HIGH
    CVE-2023-42824 - Apple iOS and iPadOS Kernel Privilege Escalation Vulnerability -

    Action Due Oct 26, 2023 Target Vendor : Apple

    Description : Apple iOS and iPadOS contain an unspecified vulnerability that allows for local privilege escalation.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT213961; https://nvd.nist.gov/vuln/detail/CVE-2023-42824

    Alert Date: Oct 05, 2023 | 704 days ago

    10.0

    CRITICAL
    CVE-2023-22515 - Atlassian Confluence Data Center and Server Broken Access Control Vulnerability -

    Action Due Oct 13, 2023 Target Vendor : Atlassian

    Description : Atlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22515

    Alert Date: Oct 05, 2023 | 704 days ago

    9.8

    CRITICAL
    CVE-2023-42793 - JetBrains TeamCity Authentication Bypass Vulnerability -

    Action Due Oct 25, 2023 Target Vendor : JetBrains

    Description : JetBrains TeamCity contains an authentication bypass vulnerability that allows for remote code execution on TeamCity Server.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://blog.jetbrains.com/teamcity/2023/09/critical-security-issue-affecting-teamcity-on-premises-update-to-2023-05-4-now/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-42793

    Alert Date: Oct 04, 2023 | 705 days ago

    7.0

    HIGH
    CVE-2023-28229 - Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability -

    Action Due Oct 25, 2023 Target Vendor : Microsoft

    Description : Microsoft Windows Cryptographic Next Generation (CNG) Key Isolation Service contains an unspecified vulnerability that allows an attacker to gain specific limited SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28229; https://nvd.nist.gov/vuln/detail/CVE-2023-28229

    Alert Date: Oct 04, 2023 | 705 days ago

    5.5

    MEDIUM
    CVE-2023-4211 - Arm Mali GPU Kernel Driver Use-After-Free Vulnerability -

    Action Due Oct 24, 2023 Target Vendor : Arm

    Description : Arm Mali GPU Kernel Driver contains a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2023-4211

    Alert Date: Oct 03, 2023 | 706 days ago

    8.8

    HIGH
    CVE-2023-5217 - Google Chromium libvpx Heap Buffer Overflow Vulnerability -

    Action Due Oct 23, 2023 Target Vendor : Google

    Description : Google Chromium libvpx contains a heap buffer overflow vulnerability in vp8 encoding that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could impact web browsers using libvpx, including but not limited to Google Chrome.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html; https://nvd.nist.gov/vuln/detail/CVE-2023-5217

    Alert Date: Oct 02, 2023 | 707 days ago

    9.8

    CRITICAL
    CVE-2018-14667 - Red Hat JBoss RichFaces Framework Expression Language Injection Vulnerability -

    Action Due Oct 19, 2023 Target Vendor : Red Hat

    Description : Red Hat JBoss RichFaces Framework contains an expression language injection vulnerability via the UserResource resource. A remote, unauthenticated attacker could exploit this vulnerability to execute malicious code using a chain of Java serialized objects via org.ajax4jsf.resource.UserResource$UriData.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14667; https://nvd.nist.gov/vuln/detail/CVE-2018-14667

    Alert Date: Sep 28, 2023 | 711 days ago

    5.5

    MEDIUM
    CVE-2023-41991 - Apple Multiple Products Improper Certificate Validation Vulnerability -

    Action Due Oct 16, 2023 Target Vendor : Apple

    Description : Apple iOS, iPadOS, macOS, and watchOS contain an improper certificate validation vulnerability that can allow a malicious app to bypass signature validation.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213928, https://support.apple.com/en-us/HT213929, https://support.apple.com/en-us/HT213931 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41991

    Alert Date: Sep 25, 2023 | 714 days ago

    7.8

    HIGH
    CVE-2023-41992 - Apple Multiple Products Kernel Privilege Escalation Vulnerability -

    Action Due Oct 16, 2023 Target Vendor : Apple

    Description : Apple iOS, iPadOS, macOS, and watchOS contain an unspecified vulnerability that allows for local privilege escalation.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213928, https://support.apple.com/en-us/HT213929, https://support.apple.com/en-us/HT213931, https://support.apple.com/en-us/HT213932; https://nvd.nist.gov/vuln/detail/CVE-2023-41992

    Alert Date: Sep 25, 2023 | 714 days ago

    8.8

    HIGH
    CVE-2023-41993 - Apple Multiple Products WebKit Code Execution Vulnerability -

    Action Due Oct 16, 2023 Target Vendor : Apple

    Description : Apple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213930; https://nvd.nist.gov/vuln/detail/CVE-2023-41993

    Alert Date: Sep 25, 2023 | 714 days ago

    7.2

    HIGH
    CVE-2023-41179 - Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability -

    Action Due Oct 12, 2023 Target Vendor : Trend Micro

    Description : Trend Micro Apex One and Worry-Free Business Security contain an unspecified vulnerability in the third-party anti-virus uninstaller that could allow an attacker to manipulate the module to conduct remote code execution. An attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://success.trendmicro.com/dcx/s/solution/000294994?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-41179

    Alert Date: Sep 21, 2023 | 718 days ago

    8.8

    HIGH
    CVE-2023-28434 - MinIO Security Feature Bypass Vulnerability -

    Action Due Oct 10, 2023 Target Vendor : MinIO

    Description : MinIO contains a security feature bypass vulnerability that allows an attacker to use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket` to conduct privilege escalation. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c; https://nvd.nist.gov/vuln/detail/CVE-2023-28434

    Alert Date: Sep 19, 2023 | 720 days ago

    7.8

    HIGH
    CVE-2022-22265 - Samsung Mobile Devices Use-After-Free Vulnerability -

    Action Due Oct 09, 2023 Target Vendor : Samsung

    Description : Samsung devices with selected Exynos chipsets contain a use-after-free vulnerability that allows malicious memory write and code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1; https://nvd.nist.gov/vuln/detail/CVE-2022-22265

    Alert Date: Sep 18, 2023 | 721 days ago

    10.0

    HIGH
    CVE-2014-8361 - Realtek SDK Improper Input Validation Vulnerability -

    Action Due Oct 09, 2023 Target Vendor : Realtek

    Description : Realtek SDK contains an improper input validation vulnerability in the miniigd SOAP service that allows remote attackers to execute malicious code via a crafted NewInternalClient request.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://web.archive.org/web/20150831100501/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055; https://nvd.nist.gov/vuln/detail/CVE-2014-8361

    Alert Date: Sep 18, 2023 | 721 days ago

    9.8

    CRITICAL
    CVE-2021-3129 - Laravel Ignition File Upload Vulnerability -

    Action Due Oct 09, 2023 Target Vendor : Laravel

    Description : Laravel Ignition contains a file upload vulnerability that allows unauthenticated remote attackers to execute malicious code due to insecure usage of file_get_contents() and file_put_contents().

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://github.com/facade/ignition/releases/tag/2.5.2; https://nvd.nist.gov/vuln/detail/CVE-2021-3129

    Alert Date: Sep 18, 2023 | 721 days ago

    9.0

    HIGH
    CVE-2017-6884 - Zyxel EMG2926 Routers Command Injection Vulnerability -

    Action Due Oct 09, 2023 Target Vendor : Zyxel

    Description : Zyxel EMG2926 routers contain a command injection vulnerability located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute malicious commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-vulnerability-in-emg2926-q10a-ethernet-cpe, https://www.zyxelguard.com/Zyxel-EOL.asp; https://nvd.nist.gov/vuln/detail/CVE-2017-6884

    Alert Date: Sep 18, 2023 | 721 days ago
Showing 20 of 1416 Results

Filters