CISA Known Exploited Vulnerabilities (KEV)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    7.5

    HIGH
    CVE-2024-29059 - Microsoft .NET Framework Information Disclosure Vulnerability -

    Action Due Feb 25, 2025 Target Vendor : Microsoft

    Description : Microsoft .NET Framework contains an information disclosure vulnerability that exposes the ObjRef URI to an attacker, ultimately enabling remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29059

    Alert Date: Feb 04, 2025 | 213 days ago

    7.8

    HIGH
    CVE-2025-24085 - Apple Multiple Products Use-After-Free Vulnerability -

    Action Due Feb 19, 2025 Target Vendor : Apple

    Description : Apple iOS, macOS, and other Apple products contain a user-after-free vulnerability that could allow a malicious application to elevate privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/122066 ; https://support.apple.com/en-us/122068 ; https://support.apple.com/en-us/122071 ; https://support.apple.com/en-us/122072 ; https://support.apple.com/en-us/122073 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24085

    Alert Date: Jan 29, 2025 | 219 days ago

    9.8

    CRITICAL
    CVE-2025-23006 - SonicWall SMA1000 Appliances Deserialization Vulnerability -

    Action Due Feb 14, 2025 Target Vendor : SonicWall

    Description : SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) contain a deserialization of untrusted data vulnerability, which can enable a remote, unauthenticated attacker to execute arbitrary OS commands.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002 ; https://nvd.nist.gov/vuln/detail/CVE-2025-23006

    Alert Date: Jan 24, 2025 | 224 days ago

    6.9

    MEDIUM
    CVE-2020-11023 - JQuery Cross-Site Scripting (XSS) Vulnerability -

    Action Due Feb 13, 2025 Target Vendor : JQuery

    Description : JQuery contains a persistent cross-site scripting (XSS) vulnerability. When passing maliciously formed, untrusted input enclosed in HTML tags, JQuery's DOM manipulators can execute untrusted code in the context of the user's browser.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2020-11023

    Alert Date: Jan 23, 2025 | 225 days ago

    10.0

    CRITICAL
    CVE-2024-50603 - Aviatrix Controllers OS Command Injection Vulnerability -

    Action Due Feb 06, 2025 Target Vendor : Aviatrix

    Description : Aviatrix Controllers contain an OS command injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://docs.aviatrix.com/documentation/latest/release-notices/psirt-advisories/psirt-advisories.html?expand=true ; https://nvd.nist.gov/vuln/detail/CVE-2024-50603

    Alert Date: Jan 16, 2025 | 232 days ago

    7.8

    HIGH
    CVE-2025-21335 - Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability -

    Action Due Feb 04, 2025 Target Vendor : Microsoft

    Description : Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21335 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21335

    Alert Date: Jan 14, 2025 | 234 days ago

    7.8

    HIGH
    CVE-2025-21334 - Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability -

    Action Due Feb 04, 2025 Target Vendor : Microsoft

    Description : Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21334 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21334

    Alert Date: Jan 14, 2025 | 234 days ago

    7.8

    HIGH
    CVE-2025-21333 - Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability -

    Action Due Feb 04, 2025 Target Vendor : Microsoft

    Description : Microsoft Windows Hyper-V NT Kernel Integration VSP contains a heap-based buffer overflow vulnerability that allows a local attacker to gain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21333 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21333

    Alert Date: Jan 14, 2025 | 234 days ago

    9.8

    CRITICAL
    CVE-2024-55591 - Fortinet FortiOS Authorization Bypass Vulnerability -

    Action Due Jan 21, 2025 Target Vendor : Fortinet

    Description : Fortinet FortiOS contains an authorization bypass vulnerability that may allow an unauthenticated remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55591

    Alert Date: Jan 14, 2025 | 234 days ago

    9.9

    CRITICAL
    CVE-2023-48365 - Qlik Sense HTTP Tunneling Vulnerability -

    Action Due Feb 03, 2025 Target Vendor : Qlik

    Description : Qlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/tac-p/2120510 ; https://nvd.nist.gov/vuln/detail/CVE-2023-48365

    Alert Date: Jan 13, 2025 | 235 days ago

    7.2

    HIGH
    CVE-2024-12686 - BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability -

    Action Due Feb 03, 2025 Target Vendor : BeyondTrust

    Description : BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain an OS command injection vulnerability that can be exploited by an attacker with existing administrative privileges to upload a malicious file. Successful exploitation of this vulnerability can allow a remote attacker to execute underlying operating system commands within the context of the site user.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.beyondtrust.com/trust-center/security-advisories/bt24-11 ; https://nvd.nist.gov/vuln/detail/CVE-2024-12686

    Alert Date: Jan 13, 2025 | 235 days ago

    9.0

    CRITICAL
    CVE-2025-0282 - Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability -

    Action Due Jan 15, 2025 Target Vendor : Ivanti

    Description : Ivanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow which can lead to unauthenticated remote code execution.

    Action : Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : CISA Mitigation Instructions: https://www.cisa.gov/cisa-mitigation-instructions-CVE-2025-0282 Additional References: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0282

    Alert Date: Jan 08, 2025 | 240 days ago

    9.8

    CRITICAL
    CVE-2020-2883 - Oracle WebLogic Server Unspecified Vulnerability -

    Action Due Jan 28, 2025 Target Vendor : Oracle

    Description : Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an unspecified vulnerability exploitable by an unauthenticated attacker with network access via IIOP or T3.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.oracle.com/security-alerts/cpuapr2020.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-2883

    Alert Date: Jan 07, 2025 | 241 days ago

    4.4

    MEDIUM
    CVE-2024-55550 - Mitel MiCollab Path Traversal Vulnerability -

    Action Due Jan 28, 2025 Target Vendor : Mitel

    Description : Mitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55550

    Alert Date: Jan 07, 2025 | 241 days ago

    9.1

    CRITICAL
    CVE-2024-41713 - Mitel MiCollab Path Traversal Vulnerability -

    Action Due Jan 28, 2025 Target Vendor : Mitel

    Description : Mitel MiCollab contains a path traversal vulnerability that could allow an attacker to gain unauthorized and unauthenticated access. This vulnerability can be chained with CVE-2024-55550, which allows an unauthenticated, remote attacker to read arbitrary files on the server.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-41713

    Alert Date: Jan 07, 2025 | 241 days ago

    8.7

    HIGH
    CVE-2024-3393 - Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability -

    Action Due Jan 20, 2025 Target Vendor : Palo Alto Networks

    Description : Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malformed DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.paloaltonetworks.com/CVE-2024-3393 ; https://nvd.nist.gov/vuln/detail/CVE-2024-3393

    Alert Date: Dec 30, 2024 | 249 days ago

    8.1

    HIGH
    CVE-2021-44207 - Acclaim Systems USAHERDS Use of Hard-Coded Credentials Vulnerability -

    Action Due Jan 13, 2025 Target Vendor : Acclaim Systems

    Description : Acclaim Systems USAHERDS contains a hard-coded credentials vulnerability that could allow an attacker to achieve remote code execution on the system that runs the application. The MachineKey must be obtained via a separate vulnerability or other channel.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Please contact the product developer for support and vulnerability mitigation.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.acclaimsystems.com/#contact ; https://www.tnatc.org/#contact ; https://nvd.nist.gov/vuln/detail/CVE-2021-44207

    Alert Date: Dec 23, 2024 | 256 days ago

    9.8

    CRITICAL
    CVE-2024-12356 - BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability -

    Action Due Dec 27, 2024 Target Vendor : BeyondTrust

    Description : BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain a command injection vulnerability, which can allow an unauthenticated attacker to inject commands that are run as a site user.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.beyondtrust.com/trust-center/security-advisories/bt24-10 ; https://nvd.nist.gov/vuln/detail/CVE-2024-12356

    Alert Date: Dec 19, 2024 | 260 days ago

    9.1

    CRITICAL
    CVE-2021-40407 - Reolink RLC-410W IP Camera OS Command Injection Vulnerability -

    Action Due Jan 08, 2025 Target Vendor : Reolink

    Description : Reolink RLC-410W IP cameras contain an authenticated OS command injection vulnerability in the device network settings functionality.

    Action : The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://reolink.com/product-eol/ ; https://reolink.com/download-center/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-40407

    Alert Date: Dec 18, 2024 | 261 days ago

    9.0

    HIGH
    CVE-2019-11001 - Reolink Multiple IP Cameras OS Command Injection Vulnerability -

    Action Due Jan 08, 2025 Target Vendor : Reolink

    Description : Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W IP cameras contain an authenticated OS command injection vulnerability. This vulnerability allows an authenticated admin to use the "TestEmail" functionality to inject and run OS commands as root.

    Action : The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://reolink.com/product-eol/ ; https://reolink.com/download-center/ ; https://nvd.nist.gov/vuln/detail/CVE-2019-11001

    Alert Date: Dec 18, 2024 | 261 days ago
Showing 20 of 1416 Results

Filters