CISA Known Exploited Vulnerabilities (KEV)
CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.
9.3
CVE-2017-0144 - Microsoft SMBv1 Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected Feb 10, 2022
Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-0144
10.0
CVE-2015-1635 - Microsoft HTTP.sys Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : Microsoft HTTP protocol stack (HTTP.sys) contains a vulnerability that allows for remote code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2015-1635
9.8
CVE-2016-3088 - Apache ActiveMQ Improper Input Validation Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Apache
Description : The Fileserver web application in Apache ActiveMQ allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2016-3088
7.8
CVE-2022-21882 - Microsoft Win32k Privilege Escalation Vulnerability -
Action Due Feb 18, 2022 Target Vendor : Microsoft
Description : Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-21882
10.0
CVE-2014-1776 - Microsoft Internet Explorer Memory Corruption Vulnerability -
Action Due Jul 28, 2022 Target Vendor : Microsoft
Description : Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code in the context of the current user.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-021?redirectedfrom=MSDN; https://nvd.nist.gov/vuln/detail/CVE-2014-1776
10.0
CVE-2014-6271 - GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability -
Action Due Jul 28, 2022 Target Vendor : GNU
Description : GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2014-6271
9.8
CVE-2021-20038 - SonicWall SMA 100 Appliances Stack-Based Buffer Overflow Vulnerability -
Action Due Feb 11, 2022 Target Vendor : SonicWall
Description : SonicWall SMA 100 devies are vulnerable to an unauthenticated stack-based buffer overflow vulnerability where exploitation can result in code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected Jan 28, 2022
Notes : https://nvd.nist.gov/vuln/detail/CVE-2021-20038
10.0
CVE-2014-7169 - GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability -
Action Due Jul 28, 2022 Target Vendor : GNU
Description : GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code. This CVE correctly remediates the vulnerability in CVE-2014-6271.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2014-7169
7.8
CVE-2020-0787 - Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability -
Action Due Jul 28, 2022 Target Vendor : Microsoft
Description : Microsoft Windows BITS is vulnerable to to a privilege elevation vulnerability if it improperly handles symbolic links. An actor can exploit this vulnerability to execute arbitrary code with system-level privileges.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected Jan 28, 2022
Notes : https://nvd.nist.gov/vuln/detail/CVE-2020-0787
10.0
CVE-2022-22587 - Apple Memory Corruption Vulnerability -
Action Due Feb 11, 2022 Target Vendor : Apple
Description : Apple IOMobileFrameBuffer contains a memory corruption vulnerability which can allow a malicious application to execute arbitrary code with kernel privileges.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-22587
10.0
CVE-2020-5722 - Grandstream Networks UCM6200 Series SQL Injection Vulnerability -
Action Due Jul 28, 2022 Target Vendor : Grandstream
Description : Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. Exploitation can allow for code execution as root.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2020-5722
10.0
CVE-2017-5689 - Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability Privilege Escalation Vulnerability -
Action Due Jul 28, 2022 Target Vendor : Intel
Description : Intel products contain a vulnerability which can allow attackers to perform privilege escalation.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-5689
9.8
CVE-2012-0391 - Apache Struts 2 Improper Input Validation Vulnerability -
Action Due Jul 21, 2022 Target Vendor : Apache
Description : The ExceptionDelegator component in Apache Struts 2 before 2.2.3.1 contains an improper input validation vulnerability that allows for remote code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2012-0391
7.8
CVE-2018-8453 - Microsoft Win32k Privilege Escalation Vulnerability -
Action Due Jul 21, 2022 Target Vendor : Microsoft
Description : Microsoft Windows Win32k contains a vulnerability that allows an attacker to escalate privileges.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected Jan 21, 2022
Notes : https://nvd.nist.gov/vuln/detail/CVE-2018-8453
5.3
CVE-2021-35247 - SolarWinds Serv-U Improper Input Validation Vulnerability -
Action Due Feb 04, 2022 Target Vendor : SolarWinds
Description : SolarWinds Serv-U versions 15.2.5 and earlier contain an improper input validation vulnerability that allows attackers to build and send queries without sanitization.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2021-35247
7.8
CVE-2006-1547 - Apache Struts 1 ActionForm Denial-of-Service Vulnerability -
Action Due Jul 21, 2022 Target Vendor : Apache
Description : ActionForm in Apache Struts versions before 1.2.9 with BeanUtils 1.7 contains a vulnerability that allows for denial-of-service (DoS).
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2006-1547
9.1
CVE-2021-32648 - October CMS Improper Authentication -
Action Due Feb 01, 2022 Target Vendor : October CMS
Description : In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2021-32648
9.8
CVE-2021-40870 - Aviatrix Controller Unrestricted Upload of File -
Action Due Feb 01, 2022 Target Vendor : Aviatrix
Description : Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2021-40870
7.8
CVE-2021-21315 - System Information Library for Node.JS Command Injection -
Action Due Feb 01, 2022 Target Vendor : Npm package
Description : In this vulnerability, an attacker can send a malicious payload that will exploit the name parameter. After successful exploitation, attackers can execute remote.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2021-21315
8.8
CVE-2020-13671 - Drupal core Un-restricted Upload of File -
Action Due Jul 18, 2022 Target Vendor : Drupal
Description : Improper sanitization in the extension file names is present in Drupal core.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2020-13671