CISA Known Exploited Vulnerabilities (KEV)
CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.
8.8
CVE-2016-6366 - Cisco Adaptive Security Appliance (ASA) SNMP Buffer Overflow Vulnerability -
Action Due Jun 14, 2022 Target Vendor : Cisco
Description :A buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) code of Cisco ASA software could allow an attacker to cause a reload of the affected system or to remotely execute code.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-6366
7.8
CVE-2016-6367 - Cisco Adaptive Security Appliance (ASA) CLI Remote Code Execution Vulnerability -
Action Due Jun 14, 2022 Target Vendor : Cisco
Description :A vulnerability in the command-line interface (CLI) parser of Cisco ASA software could allow an authenticated, local attacker to create a denial-of-service (DoS) condition or potentially execute code.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-6367
6.5
CVE-2016-3298 - Microsoft Internet Explorer Messaging API Information Disclosure Vulnerability -
Action Due Jun 14, 2022 Target Vendor : Microsoft
Description :An information disclosure vulnerability exists when the Microsoft Internet Messaging API improperly handles objects in memory. An attacker who successfully exploited this vulnerability could allow the attacker to test for the presence of files on disk.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-3298
8.8
CVE-2017-0149 - Microsoft Internet Explorer Memory Corruption Vulnerability -
Action Due Jun 14, 2022 Target Vendor : Microsoft
Description :Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause a denial-of-service (DoS) via a crafted website.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2017-0149
7.8
CVE-2018-8589 - Microsoft Win32k Privilege Escalation Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Microsoft
Description :A privilege escalation vulnerability exists when Windows improperly handles calls to Win32k.sys. An attacker who successfully exploited this vulnerability could run remote code in the security context of the local system.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2018-8589
10.0
CVE-2018-5002 - Adobe Flash Player Stack-based Buffer Overflow Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Adobe
Description :Adobe Flash Player have a stack-based buffer overflow vulnerability that could lead to remote code execution.
Action :The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2018-5002
7.8
CVE-2019-1130 - Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Microsoft
Description :A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected May 23, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-1130
7.8
CVE-2019-1385 - Microsoft Windows AppX Deployment Extensions Privilege Escalation Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Microsoft
Description :A privilege escalation vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected May 23, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-1385
8.2
CVE-2019-18426 - WhatsApp Cross-Site Scripting Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Meta Platforms
Description :A vulnerability in WhatsApp Desktop when paired with WhatsApp for iPhone allows cross-site scripting and local file reading.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-18426
7.8
CVE-2021-1048 - Android Kernel Use-After-Free Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Android
Description :Android kernel contains a use-after-free vulnerability that allows for privilege escalation.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-1048
6.5
CVE-2022-20821 - Cisco IOS XR Open Port Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Cisco
Description :Cisco IOS XR software health check opens TCP port 6379 by default on activation. An attacker can connect to the Redis instance on the open port and allow access to the Redis instance that is running within the NOSi container.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-20821
6.9
CVE-2021-0920 - Android Kernel Race Condition Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Android
Description :Android kernel contains a race condition, which allows for a use-after-free vulnerability. Exploitation can allow for privilege escalation.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-0920
9.3
CVE-2021-30883 - Apple Multiple Products Memory Corruption Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Apple
Description :Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for remote code execution.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-30883
7.8
CVE-2020-1027 - Microsoft Windows Kernel Privilege Escalation Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Microsoft
Description :An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2020-1027
7.8
CVE-2020-0638 - Microsoft Update Notification Manager Privilege Escalation Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Microsoft
Description :Microsoft Update Notification Manager contains an unspecified vulnerability that allows for privilege escalation.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected May 23, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2020-0638
7.8
CVE-2019-7286 - Apple Multiple Products Memory Corruption Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Apple
Description :Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for privilege escalation.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-7286
9.3
CVE-2019-7287 - Apple iOS Memory Corruption Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Apple
Description :Apple iOS contains a memory corruption vulnerability which could allow an attacker to perform remote code execution.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-7287
6.5
CVE-2019-0676 - Microsoft Internet Explorer Information Disclosure Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Microsoft
Description :An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-0676
6.5
CVE-2019-5786 - Google Chrome Blink Use-After-Free Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Google
Description :Google Chrome Blink contains a heap use-after-free vulnerability that allows an attacker to potentially perform out of bounds memory access via a crafted HTML page.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-5786
6.5
CVE-2019-0703 - Microsoft Windows SMB Information Disclosure Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Microsoft
Description :An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, which could lead to information disclosure from the server.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-0703