CISA Known Exploited Vulnerabilities (KEV)

CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.

    9.8

    CRITICAL
    CVE-2020-17463 - Fuel CMS SQL Injection Vulnerability -

    Action Due Jun 10, 2022 Target Vendor : Fuel CMS

    Description :FUEL CMS 1.4.7 allows SQL Injection via the col parameter to /pages/items, /permissions/items, or /navigation/items.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2020-17463

    Alert Date: Dec 10, 2021 | 1548 days ago

    7.8

    HIGH
    CVE-2019-13272 - Linux Kernel Improper Privilege Management Vulnerability -

    Action Due Jun 10, 2022 Target Vendor : Linux

    Description :Kernel/ptrace.c in Linux kernel mishandles contains an improper privilege management vulnerability that allows local users to obtain root access.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-13272

    Alert Date: Dec 10, 2021 | 1548 days ago

    10.0

    HIGH
    CVE-2021-44515 - Zoho Desktop Central Authentication Bypass Vulnerability -

    Action Due Dec 24, 2021 Target Vendor : Zoho

    Description :Zoho Desktop Central contains an authentication bypass vulnerability that could allow an attacker to execute arbitrary code in the Desktop Central MSP server.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-44515

    Alert Date: Dec 10, 2021 | 1548 days ago

    9.8

    CRITICAL
    CVE-2017-12149 - Red Hat JBoss Application Server Remote Code Execution Vulnerability -

    Action Due Jun 10, 2022 Target Vendor : Red Hat

    Description :The JBoss Application Server, shipped with Red Hat Enterprise Application Platform 5.2, allows an attacker to execute arbitrary code via crafted serialized data.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Dec 10, 2021

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2017-12149

    Alert Date: Dec 10, 2021 | 1548 days ago

    9.0

    CRITICAL
    CVE-2021-40438 - Apache HTTP Server-Side Request Forgery (SSRF) -

    Action Due Dec 15, 2021 Target Vendor : Apache

    Description :A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-40438

    Alert Date: Dec 01, 2021 | 1557 days ago

    9.8

    CRITICAL
    CVE-2021-44077 - Zoho ManageEngine ServiceDesk Plus Remote Code Execution Vulnerability -

    Action Due Dec 15, 2021 Target Vendor : Zoho

    Description :Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-44077

    Alert Date: Dec 01, 2021 | 1557 days ago

    9.8

    CRITICAL
    CVE-2021-37415 - Zoho ManageEngine ServiceDesk Authentication Bypass Vulnerability -

    Action Due Dec 15, 2021 Target Vendor : Zoho

    Description :Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-37415

    Alert Date: Dec 01, 2021 | 1557 days ago

    9.1

    CRITICAL
    CVE-2018-14847 - MikroTik Router OS Directory Traversal Vulnerability -

    Action Due Jun 01, 2022 Target Vendor : MikroTik

    Description :MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2018-14847

    Alert Date: Dec 01, 2021 | 1557 days ago

    7.8

    HIGH
    CVE-2020-11261 - Qualcomm Multiple Chipsets Improper Input Validation Vulnerability -

    Action Due Jun 01, 2022 Target Vendor : Qualcomm

    Description :Memory corruption due to improper check to return error when user application requests memory allocation of a huge size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2020-11261

    Alert Date: Dec 01, 2021 | 1557 days ago

    7.8

    HIGH
    CVE-2021-42292 - Microsoft Excel Security Feature Bypass -

    Action Due Dec 01, 2021 Target Vendor : Microsoft

    Description :A security feature bypass vulnerability in Microsoft Excel would allow a local user to perform arbitrary code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-42292

    Alert Date: Nov 17, 2021 | 1571 days ago

    7.8

    HIGH
    CVE-2021-22204 - ExifTool Remote Code Execution Vulnerability -

    Action Due Dec 01, 2021 Target Vendor : Perl

    Description :Improper neutralization of user data in the DjVu file format in Exiftool versions 7.44 and up allows arbitrary code execution when parsing the malicious image

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-22204

    Alert Date: Nov 17, 2021 | 1571 days ago

    7.8

    HIGH
    CVE-2021-40449 - Microsoft Windows Win32k Privilege Escalation Vulnerability -

    Action Due Dec 01, 2021 Target Vendor : Microsoft

    Description :Unspecified vulnerability allows for an authenticated user to escalate privileges.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Nov 17, 2021

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-40449

    Alert Date: Nov 17, 2021 | 1571 days ago

    8.8

    HIGH
    CVE-2021-42321 - Microsoft Exchange Server Remote Code Execution Vulnerability -

    Action Due Dec 01, 2021 Target Vendor : Microsoft

    Description :An authenticated attacker could leverage improper validation in cmdlet arguments within Microsoft Exchange and perform remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Nov 17, 2021

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-42321

    Alert Date: Nov 17, 2021 | 1571 days ago

    7.2

    HIGH
    CVE-2020-8243 - Ivanti Pulse Connect Secure Code Execution Vulnerability -

    Action Due May 03, 2022 Target Vendor : Ivanti

    Description :Ivanti Pulse Connect Secure contains an unspecified vulnerability in the admin web interface that could allow an authenticated attacker to upload a custom template to perform code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2020-8243

    Alert Date: Nov 03, 2021 | 1585 days ago

    9.0

    HIGH
    CVE-2021-34527 - Microsoft Windows Print Spooler Remote Code Execution Vulnerability -

    Action Due May 03, 2022 Target Vendor : Microsoft

    Description :Microsoft Windows Print Spooler contains an unspecified vulnerability due to the Windows Print Spooler service improperly performing privileged file operations. Successful exploitation allows an attacker to perform remote code execution with SYSTEM privileges. The vulnerability is also known under the moniker of PrintNightmare.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Nov 03, 2021

    Notes :Reference CISA's ED 21-04 (https://www.cisa.gov/news-events/directives/ed-21-04-mitigate-windows-print-spooler-service-vulnerability) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-04. https://nvd.nist.gov/vuln/detail/CVE-2021-34527

    Alert Date: Nov 03, 2021 | 1585 days ago

    9.8

    CRITICAL
    CVE-2021-40539 - Zoho ManageEngine ADSelfService Plus Authentication Bypass Vulnerability -

    Action Due Nov 17, 2021 Target Vendor : Zoho

    Description :Zoho ManageEngine ADSelfService Plus contains an authentication bypass vulnerability affecting the REST API URLs which allow for remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Nov 03, 2021

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-40539

    Alert Date: Nov 03, 2021 | 1585 days ago

    9.8

    CRITICAL
    CVE-2020-16846 - SaltStack Salt Shell Injection Vulnerability -

    Action Due May 03, 2022 Target Vendor : SaltStack

    Description :SaltStack Salt allows an unauthenticated user with network access to the Salt API to use shell injections to run code on the Salt API using the SSH client. This vulnerability affects any users running the Salt API.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2020-16846

    Alert Date: Nov 03, 2021 | 1585 days ago

    10.0

    CRITICAL
    CVE-2019-11510 - Ivanti Pulse Connect Secure Arbitrary File Read Vulnerability -

    Action Due May 03, 2022 Target Vendor : Ivanti

    Description :Ivanti Pulse Connect Secure contains an arbitrary file read vulnerability that allows an unauthenticated remote attacker with network access via HTTPS to send a specially crafted URI.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Nov 03, 2021

    Notes :Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2019-11510

    Alert Date: Nov 03, 2021 | 1585 days ago

    8.8

    HIGH
    CVE-2021-22899 - Ivanti Pulse Connect Secure Command Injection Vulnerability -

    Action Due May 03, 2022 Target Vendor : Ivanti

    Description :Ivanti Pulse Connect Secure contains a command injection vulnerability that allows remote authenticated users to perform remote code execution via Windows File Resource Profiles.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22899

    Alert Date: Nov 03, 2021 | 1585 days ago

    8.5

    HIGH
    CVE-2019-19356 - Netis WF2419 Devices Remote Code Execution Vulnerability -

    Action Due May 03, 2022 Target Vendor : Netis

    Description :Netis WF2419 devices contains an unspecified vulnerability that allows an attacker to perform remote code execution as root through the router's web management page.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-19356

    Alert Date: Nov 03, 2021 | 1585 days ago
Showing 20 of 1540 Results

Filters