CISA Known Exploited Vulnerabilities (KEV)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    9.6

    CRITICAL
    CVE-2022-4135 - Google Chromium GPU Heap Buffer Overflow Vulnerability -

    Action Due Dec 19, 2022 Target Vendor : Google

    Description : Google Chromium GPU contains a heap buffer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_24.html; https://nvd.nist.gov/vuln/detail/CVE-2022-4135

    Alert Date: Nov 28, 2022 | 1013 days ago

    5.4

    MEDIUM
    CVE-2022-41049 - Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability -

    Action Due Dec 09, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41049; https://nvd.nist.gov/vuln/detail/CVE-2022-41049

    Alert Date: Nov 14, 2022 | 1027 days ago

    5.4

    MEDIUM
    CVE-2022-41091 - Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability -

    Action Due Dec 09, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41091; https://nvd.nist.gov/vuln/detail/CVE-2022-41091

    Alert Date: Nov 08, 2022 | 1033 days ago

    7.8

    HIGH
    CVE-2022-41073 - Microsoft Windows Print Spooler Privilege Escalation Vulnerability -

    Action Due Dec 09, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows Print Spooler contains an unspecified vulnerability that allows an attacker to gain SYSTEM-level privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41073; https://nvd.nist.gov/vuln/detail/CVE-2022-41073

    Alert Date: Nov 08, 2022 | 1033 days ago

    7.8

    HIGH
    CVE-2022-41125 - Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability -

    Action Due Dec 09, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows Cryptographic Next Generation (CNG) Key Isolation Service contains an unspecified vulnerability that allows an attacker to gain SYSTEM-level privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41125; https://nvd.nist.gov/vuln/detail/CVE-2022-41125

    Alert Date: Nov 08, 2022 | 1033 days ago

    8.8

    HIGH
    CVE-2022-41128 - Microsoft Windows Scripting Languages Remote Code Execution Vulnerability -

    Action Due Dec 09, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows contains an unspecified vulnerability in the JScript9 scripting language which allows for remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41128; https://nvd.nist.gov/vuln/detail/CVE-2022-41128

    Alert Date: Nov 08, 2022 | 1033 days ago

    7.1

    HIGH
    CVE-2021-25337 - Samsung Mobile Devices Improper Access Control Vulnerability -

    Action Due Nov 29, 2022 Target Vendor : Samsung

    Description : Samsung mobile devices contain an improper access control vulnerability in clipboard service which allows untrusted applications to read or write arbitrary files. This vulnerability was chained with CVE-2021-25369 and CVE-2021-25370.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25337

    Alert Date: Nov 08, 2022 | 1033 days ago

    6.2

    MEDIUM
    CVE-2021-25369 - Samsung Mobile Devices Improper Access Control Vulnerability -

    Action Due Nov 29, 2022 Target Vendor : Samsung

    Description : Samsung mobile devices using Mali GPU contains an improper access control vulnerability in sec_log file. Exploitation of the vulnerability exposes sensitive kernel information to the userspace. This vulnerability was chained with CVE-2021-25337 and CVE-2021-25370.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25369

    Alert Date: Nov 08, 2022 | 1033 days ago

    6.1

    MEDIUM
    CVE-2021-25370 - Samsung Mobile Devices Memory Corruption Vulnerability -

    Action Due Nov 29, 2022 Target Vendor : Samsung

    Description : Samsung mobile devices using Mali GPU contain an incorrect implementation handling file descriptor in dpu driver. This incorrect implementation results in memory corruption, leading to kernel panic. This vulnerability was chained with CVE-2021-25337 and CVE-2021-25369.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25370

    Alert Date: Nov 08, 2022 | 1033 days ago

    8.8

    HIGH
    CVE-2022-3723 - Google Chromium V8 Type Confusion Vulnerability -

    Action Due Nov 18, 2022 Target Vendor : Google

    Description : Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_27.html; https://nvd.nist.gov/vuln/detail/CVE-2022-3723

    Alert Date: Oct 28, 2022 | 1044 days ago

    7.8

    HIGH
    CVE-2022-42827 - Apple iOS and iPadOS Out-of-Bounds Write Vulnerability -

    Action Due Nov 15, 2022 Target Vendor : Apple

    Description : Apple iOS and iPadOS kernel contain an out-of-bounds write vulnerability which can allow an application to perform code execution with kernel privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT213489; https://nvd.nist.gov/vuln/detail/CVE-2022-42827

    Alert Date: Oct 25, 2022 | 1047 days ago

    6.5

    MEDIUM
    CVE-2020-3153 - Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability -

    Action Due Nov 14, 2022 Target Vendor : Cisco

    Description : Cisco AnyConnect Secure Mobility Client for Windows allows for incorrect handling of directory paths. An attacker with valid credentials on Windows would be able to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-win-path-traverse-qO4HWBsj; https://nvd.nist.gov/vuln/detail/CVE-2020-3153

    Alert Date: Oct 24, 2022 | 1048 days ago

    9.8

    CRITICAL
    CVE-2018-19323 - GIGABYTE Multiple Products Privilege Escalation Vulnerability -

    Action Due Nov 14, 2022 Target Vendor : GIGABYTE

    Description : The GPCIDrv and GDrv low-level drivers in GIGABYTE App Center, AORUS Graphics Engine, XTREME Gaming Engine, and OC GURU expose functionality to read and write arbitrary physical memory. This could be leveraged by a local attacker to elevate privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19323

    Alert Date: Oct 24, 2022 | 1048 days ago

    7.8

    HIGH
    CVE-2018-19322 - GIGABYTE Multiple Products Code Execution Vulnerability -

    Action Due Nov 14, 2022 Target Vendor : GIGABYTE

    Description : The GPCIDrv and GDrv low-level drivers in GIGABYTE App Center, AORUS Graphics Engine, XTREME Gaming Engine, and OC GURU II expose functionality to read/write data from/to IO ports. This could be leveraged in a number of ways to ultimately run code with elevated privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19322

    Alert Date: Oct 24, 2022 | 1048 days ago

    7.8

    HIGH
    CVE-2018-19321 - GIGABYTE Multiple Products Privilege Escalation Vulnerability -

    Action Due Nov 14, 2022 Target Vendor : GIGABYTE

    Description : The GPCIDrv and GDrv low-level drivers in GIGABYTE App Center, AORUS Graphics Engine, XTREME Gaming Engine, and OC GURU II expose functionality to read and write arbitrary physical memory. This could be leveraged by a local attacker to elevate privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19321

    Alert Date: Oct 24, 2022 | 1048 days ago

    7.8

    HIGH
    CVE-2018-19320 - GIGABYTE Multiple Products Unspecified Vulnerability -

    Action Due Nov 14, 2022 Target Vendor : GIGABYTE

    Description : The GDrv low-level driver in GIGABYTE App Center, AORUS Graphics Engine, XTREME Gaming Engine, and OC GURU II exposes ring0 memcpy-like functionality that could allow a local attacker to take complete control of the affected system.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19320

    Alert Date: Oct 24, 2022 | 1048 days ago

    7.8

    HIGH
    CVE-2020-3433 - Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability -

    Action Due Nov 14, 2022 Target Vendor : Cisco

    Description : Cisco AnyConnect Secure Mobility Client for Windows interprocess communication (IPC) channel allows for insufficient validation of resources that are loaded by the application at run time. An attacker with valid credentials on Windows could execute code on the affected machine with SYSTEM privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW; https://nvd.nist.gov/vuln/detail/CVE-2020-3433

    Alert Date: Oct 24, 2022 | 1048 days ago

    9.8

    CRITICAL
    CVE-2022-41352 - Zimbra Collaboration (ZCS) Arbitrary File Upload Vulnerability -

    Action Due Nov 10, 2022 Target Vendor : Zimbra

    Description : Zimbra Collaboration (ZCS) allows an attacker to upload arbitrary files using cpio package to gain incorrect access to any other user accounts.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://wiki.zimbra.com/wiki/Security_Center; https://nvd.nist.gov/vuln/detail/CVE-2022-41352

    Alert Date: Oct 20, 2022 | 1052 days ago

    8.8

    HIGH
    CVE-2021-3493 - Linux Kernel Privilege Escalation Vulnerability -

    Action Due Nov 10, 2022 Target Vendor : Linux

    Description : The overlayfs stacking file system in Linux kernel does not properly validate the application of file capabilities against user namespaces, which could lead to privilege escalation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52; https://nvd.nist.gov/vuln/detail/CVE-2021-3493

    Alert Date: Oct 20, 2022 | 1052 days ago

    9.8

    CRITICAL
    CVE-2022-40684 - Fortinet Multiple Products Authentication Bypass Vulnerability -

    Action Due Nov 01, 2022 Target Vendor : Fortinet

    Description : Fortinet FortiOS, FortiProxy, and FortiSwitchManager contain an authentication bypass vulnerability that could allow an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.fortiguard.com/psirt/FG-IR-22-377; https://nvd.nist.gov/vuln/detail/CVE-2022-40684

    Alert Date: Oct 11, 2022 | 1061 days ago
Showing 20 of 1416 Results

Filters