CISA Known Exploited Vulnerabilities

This dashboard displays the latest vulnerabilities published by the Cybersecurity & Infrastructure Security Agency (CISA).

CVE-2024-1086

Linux Kernel Use-After-Free Vulnerability

Vendor: Linux

Product: Kernel

Added: 2024-05-30

Due Date: 2024-06-20

Description:

Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-416

CVE-2024-24919

Ransomware

Check Point Quantum Security Gateways Information Disclosure Vulnerability

Vendor: Check Point

Product: Quantum Security Gateways

Added: 2024-05-30

Due Date: 2024-06-20

Description:

Check Point Quantum Security Gateways contain an unspecified information disclosure vulnerability. The vulnerability potentially allows an attacker to access information on Gateways connected to the internet, with IPSec VPN, Remote Access VPN or Mobile Access enabled. This issue affects several product lines from Check Point, including CloudGuard Network, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark Appliances.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-200

CVE-2024-4978

Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability

Vendor: Justice AV Solutions

Product: Viewer

Added: 2024-05-29

Due Date: 2024-06-19

Description:

Justice AV Solutions (JAVS) Viewer installer contains a malicious version of ffmpeg.exe, named fffmpeg.exe (SHA256: 421a4ad2615941b177b6ec4ab5e239c14e62af2ab07c6df1741e2a62223223c4). When run, this creates a backdoor connection to a malicious C2 server.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-506

CVE-2024-5274

Google Chromium V8 Type Confusion Vulnerability

Vendor: Google

Product: Chromium V8

Added: 2024-05-28

Due Date: 2024-06-18

Description:

Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-843

CVE-2020-17519

Apache Flink Improper Access Control Vulnerability

Vendor: Apache

Product: Flink

Added: 2024-05-23

Due Date: 2024-06-13

Description:

Apache Flink contains an improper access control vulnerability that allows an attacker to read any file on the local filesystem of the JobManager through its REST interface.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-552

CVE-2024-4947

Google Chromium V8 Type Confusion Vulnerability

Vendor: Google

Product: Chromium V8

Added: 2024-05-20

Due Date: 2024-06-10

Description:

Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-843

CVE-2023-43208

NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability

Vendor: NextGen Healthcare

Product: Mirth Connect

Added: 2024-05-20

Due Date: 2024-06-10

Description:

NextGen Healthcare Mirth Connect contains a deserialization of untrusted data vulnerability that allows for unauthenticated remote code execution via a specially crafted request.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-502

CVE-2024-4761

Google Chromium V8 Out-of-Bounds Memory Write Vulnerability

Vendor: Google

Product: Chromium V8

Added: 2024-05-16

Due Date: 2024-06-06

Description:

Google Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-787

CVE-2021-40655

D-Link DIR-605 Router Information Disclosure Vulnerability

Vendor: D-Link

Product: DIR-605 Router

Added: 2024-05-16

Due Date: 2024-06-06

Description:

D-Link DIR-605 routers contain an information disclosure vulnerability that allows attackers to obtain a username and password by forging a post request to the /getcfg.php page.

Required Action:

This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

CWEs:

CWE-863

CVE-2014-100005

D-Link DIR-600 Router Cross-Site Request Forgery (CSRF) Vulnerability

Vendor: D-Link

Product: DIR-600 Router

Added: 2024-05-16

Due Date: 2024-06-06

Description:

D-Link DIR-600 routers contain a cross-site request forgery (CSRF) vulnerability that allows an attacker to change router configurations by hijacking an existing administrator session.

Required Action:

This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

CWEs:

CWE-352

CVE-2024-30040

Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2024-05-14

Due Date: 2024-06-04

Description:

Microsoft Windows MSHTML Platform contains an unspecified vulnerability that allows for a security feature bypass.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-20

CVE-2024-30051

Ransomware

Microsoft DWM Core Library Privilege Escalation Vulnerability

Vendor: Microsoft

Product: DWM Core Library

Added: 2024-05-14

Due Date: 2024-06-04

Description:

Microsoft DWM Core Library contains a privilege escalation vulnerability that allows an attacker to gain SYSTEM privileges.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-122

CVE-2024-4671

Google Chromium Visuals Use-After-Free Vulnerability

Vendor: Google

Product: Chromium

Added: 2024-05-13

Due Date: 2024-06-03

Description:

Google Chromium Visuals contains a use-after-free vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-416

CVE-2023-7028

GitLab Community and Enterprise Editions Improper Access Control Vulnerability

Vendor: GitLab

Product: GitLab CE/EE

Added: 2024-05-01

Due Date: 2024-05-22

Description:

GitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-284

CVE-2024-29988

Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability

Vendor: Microsoft

Product: SmartScreen Prompt

Added: 2024-04-30

Due Date: 2024-05-21

Description:

Microsoft SmartScreen Prompt contains a security feature bypass vulnerability that allows an attacker to bypass the Mark of the Web (MotW) feature. This vulnerability can be chained with CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-693