CISA Known Exploited Vulnerabilities

This dashboard displays the latest vulnerabilities published by the Cybersecurity & Infrastructure Security Agency (CISA).

CVE-2021-36742

Trend Micro Multiple Products Improper Input Validation Vulnerability

Vendor: Trend Micro

Product: Apex One, Apex One as a Service, and Worry-Free Business Security

Added: 2021-11-03

Due Date: 2021-11-17

Description:

Trend Micro Apex One, Apex One as a Service, and Worry-Free Business Security contain an improper input validation vulnerability that allows for privilege escalation.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-20

CVE-2021-36741

Trend Micro Multiple Products Improper Input Validation Vulnerability

Vendor: Trend Micro

Product: Apex One, Apex One as a Service, and Worry-Free Business Security

Added: 2021-11-03

Due Date: 2021-11-17

Description:

Trend Micro Apex One, Apex One as a Service, and Worry-Free Business Security contain an improper input validation vulnerability that allows a remote attacker to upload files.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-22

CVE-2019-20085

TVT NVMS-1000 Directory Traversal Vulnerability

Vendor: TVT

Product: NVMS-1000

Added: 2021-11-03

Due Date: 2022-05-03

Description:

TVT devices utilizing NVMS-1000 software contain a directory traversal vulnerability via GET /.. requests.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-22

CVE-2020-5849

Unraid Authentication Bypass Vulnerability

Vendor: Unraid

Product: Unraid

Added: 2021-11-03

Due Date: 2022-05-03

Description:

Unraid contains an authentication bypass vulnerability that allows attackers to gain access to the administrative interface. This CVE is chainable with CVE-2020-5847 for remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-287 CWE-697

CVE-2020-5847

Unraid Remote Code Execution Vulnerability

Vendor: Unraid

Product: Unraid

Added: 2021-11-03

Due Date: 2022-05-03

Description:

Unraid contains a vulnerability due to the insecure use of the extract PHP function that can be abused to execute remote code as root. This CVE is chainable with CVE-2020-5849 for initial access.

Required Action:

Apply updates per vendor instructions.

CVE-2019-16759

vBulletin PHP Module Remote Code Execution Vulnerability

Vendor: vBulletin

Product: vBulletin

Added: 2021-11-03

Due Date: 2022-05-03

Description:

The PHP module within vBulletin contains an unspecified vulnerability that allows for remote code execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-94

CVE-2020-17496

vBulletin PHP Module Remote Code Execution Vulnerability

Vendor: vBulletin

Product: vBulletin

Added: 2021-11-03

Due Date: 2022-05-03

Description:

The PHP module within vBulletin contains an unspecified vulnerability that allows for remote code execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. This CVE ID resolves an incomplete patch for CVE-2019-16759.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-74

CVE-2019-5544

Ransomware

VMware ESXi and Horizon DaaS OpenSLP Heap-Based Buffer Overflow Vulnerability

Vendor: VMware

Product: VMware ESXi and Horizon DaaS

Added: 2021-11-03

Due Date: 2022-05-03

Description:

VMware ESXi and Horizon Desktop as a Service (DaaS) OpenSLP contains a heap-based buffer overflow vulnerability that allows an attacker with network access to port 427 to overwrite the heap of the OpenSLP service to perform remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-787

CVE-2020-3992

Ransomware

VMware ESXi OpenSLP Use-After-Free Vulnerability

Vendor: VMware

Product: ESXi

Added: 2021-11-03

Due Date: 2022-05-03

Description:

VMware ESXi OpenSLP contains a use-after-free vulnerability that allows an attacker residing in the management network with access to port 427 to perform remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-416

CVE-2020-3950

VMware Multiple Products Privilege Escalation Vulnerability

Vendor: VMware

Product: Multiple Products

Added: 2021-11-03

Due Date: 2022-05-03

Description:

VMware Fusion, Remote Console (VMRC) for Mac, and Horizon Client for Mac contain a privilege escalation vulnerability due to improper use of setuid binaries that allows attackers to escalate privileges to root.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-269

CVE-2021-22005

Ransomware

VMware vCenter Server File Upload Vulnerability

Vendor: VMware

Product: vCenter Server

Added: 2021-11-03

Due Date: 2021-11-17

Description:

VMware vCenter Server contains a file upload vulnerability in the Analytics service that allows a user with network access to port 443 to execute code.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-23

CVE-2020-3952

VMware vCenter Server Information Disclosure Vulnerability

Vendor: VMware

Product: vCenter Server

Added: 2021-11-03

Due Date: 2022-05-03

Description:

VMware vCenter Server contains an information disclosure vulnerability in the VMware Directory Service (vmdir) when the Platform Services Controller (PSC) does not correctly implement access controls. Successful exploitation allows an attacker with network access to port 389 to extract sensitive information.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-306

CVE-2021-21972

Ransomware

VMware vCenter Server Remote Code Execution Vulnerability

Vendor: VMware

Product: vCenter Server

Added: 2021-11-03

Due Date: 2021-11-17

Description:

VMware vCenter Server vSphere Client contains a remote code execution vulnerability in a vCenter Server plugin which allows an attacker with network access to port 443 to execute commands with unrestricted privileges on the underlying operating system.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-23

CVE-2021-21985

Ransomware

VMware vCenter Server Improper Input Validation Vulnerability

Vendor: VMware

Product: vCenter Server

Added: 2021-11-03

Due Date: 2021-11-17

Description:

VMware vSphere Client contains an improper input validation vulnerability in the Virtual SAN Health Check plug-in, which is enabled by default in vCenter Server, which allows for remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-20 CWE-470 CWE-918

CVE-2020-4006

Multiple VMware Products Command Injection Vulnerability

Vendor: VMware

Product: Multiple Products

Added: 2021-11-03

Due Date: 2022-05-03

Description:

VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector contain a command injection vulnerability. An attacker with network access to the administrative configurator on port 8443 and a valid password for the configurator administrator account can execute commands with unrestricted privileges on the underlying operating system.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-78