CISA Known Exploited Vulnerabilities (KEV)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    8.1

    HIGH
    CVE-2017-5521 - NETGEAR Multiple Devices Exposure of Sensitive Information Vulnerability -

    Action Due Sep 29, 2022 Target Vendor : NETGEAR

    Description : Multiple NETGEAR devices are prone to admin password disclosure via simple crafted requests to the web management server.

    Action : Apply updates per vendor instructions. If the affected device has since entered end-of-life, it should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability; https://nvd.nist.gov/vuln/detail/CVE-2017-5521

    Alert Date: Sep 08, 2022 | 1094 days ago

    6.8

    MEDIUM
    CVE-2011-4723 - D-Link DIR-300 Router Cleartext Storage of a Password Vulnerability -

    Action Due Sep 29, 2022 Target Vendor : D-Link

    Description : The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information.

    Action : The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.dlink.com/uk/en/support/product/dir-300-wireless-g-router; https://nvd.nist.gov/vuln/detail/CVE-2011-4723

    Alert Date: Sep 08, 2022 | 1094 days ago

    7.8

    HIGH
    CVE-2011-1823 - Android OS Privilege Escalation Vulnerability -

    Action Due Sep 29, 2022 Target Vendor : Android

    Description : The vold volume manager daemon in Android kernel trusts messages from a PF_NETLINK socket, which allows an attacker to execute code and gain root privileges. This vulnerability is associated with GingerBreak and Exploit.AndroidOS.Lotoor.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://android.googlesource.com/platform/system/vold/+/c51920c82463b240e2be0430849837d6fdc5352e; https://nvd.nist.gov/vuln/detail/CVE-2011-1823

    Alert Date: Sep 08, 2022 | 1094 days ago

    9.6

    CRITICAL
    CVE-2022-3075 - Google Chromium Mojo Insufficient Data Validation Vulnerability -

    Action Due Sep 29, 2022 Target Vendor : Google

    Description : Google Chromium Mojo contains an insufficient data validation vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html, https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3075; https://nvd.nist.gov/vuln/detail/CVE-2022-3075

    Alert Date: Sep 08, 2022 | 1094 days ago

    10.0

    HIGH
    CVE-2018-6530 - D-Link Multiple Routers OS Command Injection Vulnerability -

    Action Due Sep 29, 2022 Target Vendor : D-Link

    Description : Multiple D-Link routers contain an unspecified vulnerability that allows for execution of OS commands.

    Action : The vendor D-Link published an advisory stating the fix under CVE-2018-20114 properly patches KEV entry CVE-2018-6530. If the device is still supported, apply updates per vendor instructions. If the affected device has since entered its end-of-life, it should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10105; https://nvd.nist.gov/vuln/detail/CVE-2018-6530

    Alert Date: Sep 08, 2022 | 1094 days ago

    9.8

    CRITICAL
    CVE-2022-26352 - dotCMS Unrestricted Upload of File Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : dotCMS

    Description : dotCMS ContentResource API contains an unrestricted upload of file with a dangerous type vulnerability that allows for directory traversal, in which the file is saved outside of the intended storage location. Exploitation allows for remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.dotcms.com/security/SI-62; https://nvd.nist.gov/vuln/detail/CVE-2022-26352

    Alert Date: Aug 25, 2022 | 1108 days ago

    10.0

    HIGH
    CVE-2022-24706 - Apache CouchDB Insecure Default Initialization of Resource Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : Apache

    Description : Apache CouchDB contains an insecure default initialization of resource vulnerability which can allow an attacker to escalate to administrative privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00; https://nvd.nist.gov/vuln/detail/CVE-2022-24706

    Alert Date: Aug 25, 2022 | 1108 days ago

    9.8

    CRITICAL
    CVE-2022-24112 - Apache APISIX Authentication Bypass Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : Apache

    Description : Apache APISIX contains an authentication bypass vulnerability that allows for remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://lists.apache.org/thread/lcdqywz8zy94mdysk7p3gfdgn51jmt94; https://nvd.nist.gov/vuln/detail/CVE-2022-24112

    Alert Date: Aug 25, 2022 | 1108 days ago

    8.8

    HIGH
    CVE-2022-2294 - WebRTC Heap Buffer Overflow Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : WebRTC

    Description : WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows an attacker to perform shellcode execution. This vulnerability impacts web browsers using WebRTC including but not limited to Google Chrome.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://groups.google.com/g/discuss-webrtc/c/5KBtZx2gvcQ; https://nvd.nist.gov/vuln/detail/CVE-2022-2294

    Alert Date: Aug 25, 2022 | 1108 days ago

    9.8

    CRITICAL
    CVE-2021-39226 - Grafana Authentication Bypass Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : Grafana Labs

    Description : Grafana contains an authentication bypass vulnerability that allows authenticated and unauthenticated users to view and delete all snapshot data, potentially resulting in complete snapshot data loss.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://grafana.com/blog/2021/10/05/grafana-7.5.11-and-8.1.6-released-with-critical-security-fix/; https://nvd.nist.gov/vuln/detail/CVE-2021-39226

    Alert Date: Aug 25, 2022 | 1108 days ago

    7.8

    HIGH
    CVE-2021-38406 - Delta Electronics DOPSoft 2 Improper Input Validation Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : Delta Electronics

    Description : Delta Electronics DOPSoft 2 lacks proper validation of user-supplied data when parsing specific project files (improper input validation) resulting in an out-of-bounds write that allows for code execution.

    Action : The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-02; https://nvd.nist.gov/vuln/detail/CVE-2021-38406

    Alert Date: Aug 25, 2022 | 1108 days ago

    7.5

    HIGH
    CVE-2021-31010 - Apple iOS, macOS, watchOS Sandbox Bypass Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : Apple

    Description : In affected versions of Apple iOS, macOS, and watchOS, a sandboxed process may be able to circumvent sandbox restrictions.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT212804, https://support.apple.com/en-us/HT212805, https://support.apple.com/en-us/HT212806, https://support.apple.com/en-us/HT212807, https://support.apple.com/en-us/HT212824; https://nvd.nist.gov/vuln/detail/CVE-2021-31010

    Alert Date: Aug 25, 2022 | 1108 days ago

    7.8

    HIGH
    CVE-2020-28949 - PEAR Archive_Tar Deserialization of Untrusted Data Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : PEAR

    Description : PEAR Archive_Tar allows an unserialization attack because phar: is blocked but PHAR: is not blocked. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://pear.php.net/bugs/bug.php?id=27002, https://www.drupal.org/sa-core-2020-013, https://access.redhat.com/security/cve/cve-2020-28949; https://nvd.nist.gov/vuln/detail/CVE-2020-28949

    Alert Date: Aug 25, 2022 | 1108 days ago

    9.8

    CRITICAL
    CVE-2022-22963 - VMware Tanzu Spring Cloud Function Remote Code Execution Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : VMware Tanzu

    Description : When using routing functionality in VMware Tanzu's Spring Cloud Function, it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://tanzu.vmware.com/security/cve-2022-22963; https://nvd.nist.gov/vuln/detail/CVE-2022-22963

    Alert Date: Aug 25, 2022 | 1108 days ago

    7.5

    HIGH
    CVE-2020-36193 - PEAR Archive_Tar Improper Link Resolution Vulnerability -

    Action Due Sep 15, 2022 Target Vendor : PEAR

    Description : PEAR Archive_Tar Tar.php allows write operations with directory traversal due to inadequate checking of symbolic links. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916, https://www.drupal.org/sa-core-2021-001, https://access.redhat.com/security/cve/cve-2020-36193; https://nvd.nist.gov/vuln/detail/CVE-2020-36193

    Alert Date: Aug 25, 2022 | 1108 days ago

    8.6

    HIGH
    CVE-2022-0028 - Palo Alto Networks PAN-OS Reflected Amplification Denial-of-Service Vulnerability -

    Action Due Sep 12, 2022 Target Vendor : Palo Alto Networks

    Description : A Palo Alto Networks PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.paloaltonetworks.com/CVE-2022-0028; https://nvd.nist.gov/vuln/detail/CVE-2022-0028

    Alert Date: Aug 22, 2022 | 1111 days ago

    7.8

    HIGH
    CVE-2022-32894 - Apple iOS and macOS Out-of-Bounds Write Vulnerability -

    Action Due Sep 08, 2022 Target Vendor : Apple

    Description : Apple iOS and macOS contain an out-of-bounds write vulnerability that could allow an application to execute code with kernel privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413; https://nvd.nist.gov/vuln/detail/CVE-2022-32894

    Alert Date: Aug 18, 2022 | 1115 days ago

    8.8

    HIGH
    CVE-2022-32893 - Apple iOS and macOS Out-of-Bounds Write Vulnerability -

    Action Due Sep 08, 2022 Target Vendor : Apple

    Description : Apple iOS and macOS contain an out-of-bounds write vulnerability that could allow for remote code execution when processing malicious crafted web content.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413; https://nvd.nist.gov/vuln/detail/CVE-2022-32893

    Alert Date: Aug 18, 2022 | 1115 days ago

    6.5

    MEDIUM
    CVE-2022-2856 - Google Chromium Intents Insufficient Input Validation Vulnerability -

    Action Due Sep 08, 2022 Target Vendor : Google

    Description : Google Chromium Intents contains an insufficient validation of untrusted input vulnerability that allows a remote attacker to browse to a malicious website via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html; https://nvd.nist.gov/vuln/detail/CVE-2022-2856

    Alert Date: Aug 18, 2022 | 1115 days ago

    9.0

    HIGH
    CVE-2022-26923 - Microsoft Active Directory Domain Services Privilege Escalation Vulnerability -

    Action Due Sep 08, 2022 Target Vendor : Microsoft

    Description : An authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow for privilege escalation to SYSTEM.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26923; https://nvd.nist.gov/vuln/detail/CVE-2022-26923

    Alert Date: Aug 18, 2022 | 1115 days ago
Showing 20 of 1416 Results

Filters