CISA Known Exploited Vulnerabilities (KEV)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    8.1

    HIGH
    CVE-2025-23209 - Craft CMS Code Injection Vulnerability -

    Action Due Mar 13, 2025 Target Vendor : Craft CMS

    Description : Craft CMS contains a code injection vulnerability that allows for remote code execution as vulnerable versions have compromised user security keys.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://github.com/craftcms/cms/security/advisories/GHSA-x684-96hh-833x ; https://nvd.nist.gov/vuln/detail/CVE-2025-23209

    Alert Date: Feb 20, 2025 | 197 days ago

    9.1

    CRITICAL
    CVE-2025-0108 - Palo Alto PAN-OS Authentication Bypass Vulnerability -

    Action Due Mar 11, 2025 Target Vendor : Palo Alto

    Description : Palo Alto PAN-OS contains an authentication bypass vulnerability in its management web interface. This vulnerability allows an unauthenticated attacker with network access to the management web interface to bypass the authentication normally required and invoke certain PHP scripts.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.paloaltonetworks.com/CVE-2025-0108 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0108

    Alert Date: Feb 18, 2025 | 199 days ago

    9.8

    CRITICAL
    CVE-2024-53704 - SonicWall SonicOS SSLVPN Improper Authentication Vulnerability -

    Action Due Mar 11, 2025 Target Vendor : SonicWall

    Description : SonicWall SonicOS contains an improper authentication vulnerability in the SSLVPN authentication mechanism that allows a remote attacker to bypass authentication.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003 ; https://nvd.nist.gov/vuln/detail/CVE-2024-53704

    Alert Date: Feb 18, 2025 | 199 days ago

    9.1

    CRITICAL
    CVE-2024-57727 - SimpleHelp Path Traversal Vulnerability -

    Action Due Mar 06, 2025 Target Vendor : SimpleHelp

    Description : SimpleHelp remote support software contains multiple path traversal vulnerabilities that allow unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files may include server configuration files and hashed user passwords.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : "https://simple-help.com/kb---security-vulnerabilities-01-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2024-57727

    Alert Date: Feb 13, 2025 | 204 days ago

    6.1

    MEDIUM
    CVE-2025-24200 - Apple iOS and iPadOS Incorrect Authorization Vulnerability -

    Action Due Mar 05, 2025 Target Vendor : Apple

    Description : Apple iOS and iPadOS contains an incorrect authorization vulnerability that allows a physical attacker to disable USB Restricted Mode on a locked device.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/122173 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24200

    Alert Date: Feb 12, 2025 | 205 days ago

    7.2

    HIGH
    CVE-2024-41710 - Mitel SIP Phones Argument Injection Vulnerability -

    Action Due Mar 05, 2025 Target Vendor : Mitel

    Description : Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, contain an argument injection vulnerability due to insufficient parameter sanitization during the boot process. Successful exploitation may allow an attacker to execute arbitrary commands within the context of the system.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0019-001-v2.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2024-41710

    Alert Date: Feb 12, 2025 | 205 days ago

    8.8

    HIGH
    CVE-2024-40891 - Zyxel DSL CPE OS Command Injection Vulnerability -

    Action Due Mar 04, 2025 Target Vendor : Zyxel

    Description : Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authenticated attacker to execute OS commands via Telnet.

    Action : The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https://www.zyxel.com/service-provider/global/en/security-advisories/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40891

    Alert Date: Feb 11, 2025 | 206 days ago

    8.8

    HIGH
    CVE-2024-40890 - Zyxel DSL CPE OS Command Injection Vulnerability -

    Action Due Mar 04, 2025 Target Vendor : Zyxel

    Description : Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the CGI program that could allow an authenticated attacker to execute OS commands via a crafted HTTP request.

    Action : The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https://www.zyxel.com/service-provider/global/en/security-advisories/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40890

    Alert Date: Feb 11, 2025 | 206 days ago

    7.8

    HIGH
    CVE-2025-21418 - Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability -

    Action Due Mar 04, 2025 Target Vendor : Microsoft

    Description : Microsoft Windows Ancillary Function Driver for WinSock contains a heap-based buffer overflow vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21418

    Alert Date: Feb 11, 2025 | 206 days ago

    7.1

    HIGH
    CVE-2025-21391 - Microsoft Windows Storage Link Following Vulnerability -

    Action Due Mar 04, 2025 Target Vendor : Microsoft

    Description : Microsoft Windows Storage contains a link following vulnerability that could allow for privilege escalation. This vulnerability could allow an attacker to delete data including data that results in the service being unavailable.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21391 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21391

    Alert Date: Feb 11, 2025 | 206 days ago

    8.8

    HIGH
    CVE-2025-0994 - Trimble Cityworks Deserialization Vulnerability -

    Action Due Feb 28, 2025 Target Vendor : Trimble

    Description : Trimble Cityworks contains a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer's Microsoft Internet Information Services (IIS) web server.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://learn.assetlifecycle.trimble.com/i/1532182-cityworks-customer-communication-2025-02-05-docx/0?; https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-04 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0994

    Alert Date: Feb 07, 2025 | 210 days ago

    9.8

    CRITICAL
    CVE-2020-15069 - Sophos XG Firewall Buffer Overflow Vulnerability -

    Action Due Feb 27, 2025 Target Vendor : Sophos

    Description : Sophos XG Firewall contains a buffer overflow vulnerability that allows for remote code execution via the "HTTP/S bookmark" feature.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://community.sophos.com/b/security-blog/posts/advisory-buffer-overflow-vulnerability-in-user-portal ; https://nvd.nist.gov/vuln/detail/CVE-2020-15069

    Alert Date: Feb 06, 2025 | 211 days ago

    9.8

    CRITICAL
    CVE-2020-29574 - CyberoamOS (CROS) SQL Injection Vulnerability -

    Action Due Feb 27, 2025 Target Vendor : Sophos

    Description : CyberoamOS (CROS) contains a SQL injection vulnerability in the WebAdmin that allows an unauthenticated attacker to execute arbitrary SQL statements remotely.

    Action : The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.sophos.com/support/s/article/KBA-000007526 ; https://nvd.nist.gov/vuln/detail/CVE-2020-29574

    Alert Date: Feb 06, 2025 | 211 days ago

    9.8

    CRITICAL
    CVE-2024-21413 - Microsoft Outlook Improper Input Validation Vulnerability -

    Action Due Feb 27, 2025 Target Vendor : Microsoft

    Description : Microsoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21413 ; https://nvd.nist.gov/vuln/detail/CVE-2024-21413

    Alert Date: Feb 06, 2025 | 211 days ago

    7.8

    HIGH
    CVE-2022-23748 - Dante Discovery Process Control Vulnerability -

    Action Due Feb 27, 2025 Target Vendor : Audinate

    Description : Dante Discovery contains a process control vulnerability in mDNSResponder.exe that all allows for a DLL sideloading attack. A local attacker can leverage this vulnerability in the Dante Application Library to execute arbitrary code.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.getdante.com/support/faq/audinate-response-to-dante-discovery-mdnsresponder-exe-security-issue-cve-2022-23748/ ; https://nvd.nist.gov/vuln/detail/CVE-2022-23748

    Alert Date: Feb 06, 2025 | 211 days ago

    7.0

    HIGH
    CVE-2025-0411 - 7-Zip Mark of the Web Bypass Vulnerability -

    Action Due Feb 27, 2025 Target Vendor : 7-Zip

    Description : 7-Zip contains a protection mechanism failure vulnerability that allows remote attackers to bypass the Mark-of-the-Web security feature to execute arbitrary code in the context of the current user.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.7-zip.org/history.txt ; https://nvd.nist.gov/vuln/detail/CVE-2025-0411

    Alert Date: Feb 06, 2025 | 211 days ago

    7.8

    HIGH
    CVE-2024-53104 - Linux Kernel Out-of-Bounds Write Vulnerability -

    Action Due Feb 26, 2025 Target Vendor : Linux

    Description : Linux kernel contains an out-of-bounds write vulnerability in the uvc_parse_streaming component of the USB Video Class (UVC) driver that could allow for physical escalation of privilege.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://lore.kernel.org/linux-cve-announce/2024120232-CVE-2024-53104-d781@gregkh/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-53104

    Alert Date: Feb 05, 2025 | 212 days ago

    9.8

    CRITICAL
    CVE-2024-45195 - Apache OFBiz Forced Browsing Vulnerability -

    Action Due Feb 25, 2025 Target Vendor : Apache

    Description : Apache OFBiz contains a forced browsing vulnerability that allows a remote attacker to obtain unauthorized access.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://ofbiz.apache.org/security.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-45195

    Alert Date: Feb 04, 2025 | 213 days ago

    9.8

    CRITICAL
    CVE-2018-19410 - Paessler PRTG Network Monitor Local File Inclusion Vulnerability -

    Action Due Feb 25, 2025 Target Vendor : Paessler

    Description : Paessler PRTG Network Monitor contains a local file inclusion vulnerability that allows a remote, unauthenticated attacker to create users with read-write privileges (including administrator).

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.paessler.com/prtg/history/prtg-18#18.2.41.1652 ; https://nvd.nist.gov/vuln/detail/CVE-2018-19410

    Alert Date: Feb 04, 2025 | 213 days ago

    9.0

    HIGH
    CVE-2018-9276 - Paessler PRTG Network Monitor OS Command Injection Vulnerability -

    Action Due Feb 25, 2025 Target Vendor : Paessler

    Description : Paessler PRTG Network Monitor contains an OS command injection vulnerability that allows an attacker with administrative privileges to execute commands via the PRTG System Administrator web console.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.paessler.com/prtg/history/prtg-18#18.2.39 ; https://nvd.nist.gov/vuln/detail/CVE-2018-9276

    Alert Date: Feb 04, 2025 | 213 days ago
Showing 20 of 1416 Results

Filters