CISA Known Exploited Vulnerabilities (KEV)

CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.

    8.8

    HIGH
    CVE-2023-52163 - Digiever DS-2105 Pro Missing Authorization Vulnerability -

    Action Due Jan 12, 2026 Target Vendor : Digiever

    Description :Digiever DS-2105 Pro contains a missing authorization vulnerability which could allow for command injection via time_tzsetup.cgi.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://www.digiever.com/tw/support/faq-content.php?FAQ=217 ; https://nvd.nist.gov/vuln/detail/CVE-2023-52163

    Alert Date: Dec 22, 2025 | 124 days ago

    9.8

    CRITICAL
    CVE-2025-14733 - WatchGuard Firebox Out of Bounds Write Vulnerability -

    Action Due Dec 26, 2025 Target Vendor : WatchGuard

    Description :WatchGuard Fireware OS iked process contains an out of bounds write vulnerability in the OS iked process. This vulnerability may allow a remote unauthenticated attacker to execute arbitrary code and affects both the mobile user VPN with IKEv2 and the branch office VPN using IKEv2 when configured with a dynamic gateway peer.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :Check for signs of potential compromise on all internet accessible instances after applying mitigations. For more information please see: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027 ; https://nvd.nist.gov/vuln/detail/CVE-2025-14733

    Alert Date: Dec 19, 2025 | 127 days ago

    6.6

    MEDIUM
    CVE-2025-40602 - SonicWall SMA1000 Missing Authorization Vulnerability -

    Action Due Dec 24, 2025 Target Vendor : SonicWall

    Description :SonicWall SMA1000 contains a missing authorization vulnerability that could allow for privilege escalation appliance management console (AMC) of affected devices.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :Check for signs of potential compromise on all internet accessible SonicWall SMA1000 instances after applying mitigations. For more information please see: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019 ; https://nvd.nist.gov/vuln/detail/CVE-2025-40602

    Alert Date: Dec 17, 2025 | 129 days ago

    9.8

    CRITICAL
    CVE-2025-59374 - ASUS Live Update Embedded Malicious Code Vulnerability -

    Action Due Jan 07, 2026 Target Vendor : ASUS

    Description :ASUS Live Update contains an embedded malicious code vulnerability client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://www.asus.com/support/faq/1018727/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-59374

    Alert Date: Dec 17, 2025 | 129 days ago

    10.0

    CRITICAL
    CVE-2025-20393 - Cisco Multiple Products Improper Input Validation Vulnerability -

    Action Due Dec 24, 2025 Target Vendor : Cisco

    Description :Cisco Secure Email Gateway, Secure Email, AsyncOS Software, and Web Manager appliances contains an improper input validation vulnerability that allows threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :Please adhere to Cisco's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Cisco products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4 ; https://nvd.nist.gov/vuln/detail/CVE-2025-20393

    Alert Date: Dec 17, 2025 | 129 days ago

    9.8

    CRITICAL
    CVE-2025-59718 - Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability -

    Action Due Dec 23, 2025 Target Vendor : Fortinet

    Description :Fortinet FortiOS, FortiSwitchMaster, FortiProxy, and FortiWeb contain an improper verification of cryptographic signature vulnerability that may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML message. Please be aware that CVE-2025-59719 pertains to the same problem and is mentioned in the same vendor advisory. Ensure to apply all patches mentioned in the advisory.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://fortiguard.fortinet.com/psirt/FG-IR-25-647 ; https://docs.fortinet.com/upgrade-tool/fortigate ; https://nvd.nist.gov/vuln/detail/CVE-2025-59718

    Alert Date: Dec 16, 2025 | 130 days ago

    8.8

    HIGH
    CVE-2025-43529 - Apple Multiple Products Use-After-Free WebKit Vulnerability -

    Action Due Jan 05, 2026 Target Vendor : Apple

    Description :Apple iOS, iPadOS, macOS, and other Apple products contain a use-after-free vulnerability in WebKit. Processing maliciously crafted web content may lead to memory corruption. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://support.apple.com/en-us/125884 ; https://support.apple.com/en-us/125892 ; https://support.apple.com/en-us/125885 ; https://support.apple.com/en-us/125886 ; https://support.apple.com/en-us/125889 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43529

    Alert Date: Dec 15, 2025 | 131 days ago

    9.8

    CRITICAL
    CVE-2025-14611 - Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability -

    Action Due Jan 05, 2026 Target Vendor : Gladinet

    Description :Gladinet CentreStack and TrioFox contain a hardcoded cryptographic keys vulnerability for their implementation of the AES cryptoscheme. This vulnerability degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://www.centrestack.com/p/gce_latest_release.html ; https://access.triofox.com/releases_history/; https://support.centrestack.com/hc/en-us/articles/360007159054-Hardening-the-CentreStack-Cluster#h_01JQRV57T37HJFQZKBZH9NBXQP ; https://nvd.nist.gov/vuln/detail/CVE-2025-14611

    Alert Date: Dec 15, 2025 | 131 days ago

    8.8

    HIGH
    CVE-2025-14174 - Google Chromium Out of Bounds Memory Access Vulnerability -

    Action Due Jan 02, 2026 Target Vendor : Google

    Description :Google Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html ; https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security ; https://nvd.nist.gov/vuln/detail/CVE-2025-14174

    Alert Date: Dec 12, 2025 | 134 days ago

    9.0

    HIGH
    CVE-2018-4063 - Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability -

    Action Due Jan 02, 2026 Target Vendor : Sierra Wireless

    Description :Sierra Wireless AirLink ALEOS contains an unrestricted upload of file with dangerous type vulnerability. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://www.cisa.gov/news-events/ics-advisories/icsa-19-122-03 ; https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---swi-psa-2019-003 ; https://source.sierrawireless.com/resources/airlink/hardware_reference_docs/airlink_es450_eol ; https://nvd.nist.gov/vuln/detail/CVE-2018-4063

    Alert Date: Dec 12, 2025 | 134 days ago

    9.8

    CRITICAL
    CVE-2025-58360 - OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability -

    Action Due Jan 01, 2026 Target Vendor : OSGeo

    Description :OSGeo GeoServer contains an improper restriction of XML external entity reference vulnerability that occurs when the application accepts XML input through a specific endpoint /geoserver/wms operation GetMap and could allow an attacker to define external entities within the XML request.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/geoserver/geoserver/security/advisories/GHSA-fjf5-xgmq-5525 ; https://osgeo-org.atlassian.net/browse/GEOS-11922 ; https://nvd.nist.gov/vuln/detail/CVE-2025-58360

    Alert Date: Dec 11, 2025 | 135 days ago

    7.8

    HIGH
    CVE-2025-62221 - Microsoft Windows Use After Free Vulnerability -

    Action Due Dec 30, 2025 Target Vendor : Microsoft

    Description :Microsoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62221 ; https://nvd.nist.gov/vuln/detail/CVE-2025-62221

    Alert Date: Dec 09, 2025 | 137 days ago

    7.8

    HIGH
    CVE-2025-6218 - RARLAB WinRAR Path Traversal Vulnerability -

    Action Due Dec 30, 2025 Target Vendor : RARLAB

    Description :RARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=276&cHash=b5165454d983fc9717bc8748901a64f9 ; https://nvd.nist.gov/vuln/detail/CVE-2025-6218

    Alert Date: Dec 09, 2025 | 137 days ago

    9.8

    CRITICAL
    CVE-2022-37055 - D-Link Routers Buffer Overflow Vulnerability -

    Action Due Dec 29, 2025 Target Vendor : D-Link

    Description :D-Link Routers contains a buffer overflow vulnerability that has a high impact on confidentiality, integrity, and availability. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10308 ; https://nvd.nist.gov/vuln/detail/CVE-2022-37055

    Alert Date: Dec 08, 2025 | 138 days ago

    9.8

    CRITICAL
    CVE-2025-66644 - Array Networks ArrayOS AG OS Command Injection Vulnerability -

    Action Due Dec 29, 2025 Target Vendor : Array Networks

    Description :Array Networks ArrayOS AG contains an OS command injection vulnerability that could allow an attacker to execute arbitrary commands.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/ag.html ; https://www.jpcert.or.jp/at/2025/at250024.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-66644

    Alert Date: Dec 08, 2025 | 138 days ago

    10.0

    CRITICAL
    CVE-2025-55182 - Meta React Server Components Remote Code Execution Vulnerability -

    Action Due Dec 12, 2025 Target Vendor : Meta

    Description :Meta React Server Components contains a remote code execution vulnerability that could allow unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints. Please note CVE-2025-66478 has been rejected, but it is associated with CVE-2025- 55182.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known Detected Feb 26, 2026

    Notes :Check for signs of potential compromise on all internet accessible REACT instances after applying mitigations. For more information, please see: https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components ; https://github.com/vercel-labs/fix-react2shell-next?tab=readme-ov-file ; https://nvd.nist.gov/vuln/detail/CVE-2025-55182

    Alert Date: Dec 05, 2025 | 141 days ago

    8.8

    HIGH
    CVE-2021-26828 - OpenPLC ScadaBR Unrestricted Upload of File with Dangerous Type Vulnerability -

    Action Due Dec 24, 2025 Target Vendor : OpenPLC

    Description :OpenPLC ScadaBR contains an unrestricted upload of file with dangerous type vulnerability that allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://github.com/SCADA-LTS/Scada-LTS/pull/2174 ; https://nvd.nist.gov/vuln/detail/CVE-2021-26828

    Alert Date: Dec 03, 2025 | 143 days ago

    7.8

    HIGH
    CVE-2025-48633 - Android Framework Information Disclosure Vulnerability -

    Action Due Dec 23, 2025 Target Vendor : Android

    Description :Android Framework contains an unspecified vulnerability that allows for information disclosure.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://source.android.com/docs/security/bulletin/2025-12-01 ; https://nvd.nist.gov/vuln/detail/CVE-2025-48633

    Alert Date: Dec 02, 2025 | 144 days ago

    7.8

    HIGH
    CVE-2025-48572 - Android Framework Privilege Escalation Vulnerability -

    Action Due Dec 23, 2025 Target Vendor : Android

    Description :Android Framework contains an unspecified vulnerability that allows for privilege escalation.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://source.android.com/docs/security/bulletin/2025-12-01 ; https://nvd.nist.gov/vuln/detail/CVE-2025-48572

    Alert Date: Dec 02, 2025 | 144 days ago

    5.4

    MEDIUM
    CVE-2021-26829 - OpenPLC ScadaBR Cross-site Scripting Vulnerability -

    Action Due Dec 19, 2025 Target Vendor : OpenPLC

    Description :OpenPLC ScadaBR contains a cross-site scripting vulnerability via system_settings.shtm.

    Action :Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://github.com/SCADA-LTS/Scada-LTS/pull/3211 ; https://nvd.nist.gov/vuln/detail/CVE-2021-26829

    Alert Date: Nov 28, 2025 | 148 days ago
Showing 20 of 1587 Results

Filters