CISA Known Exploited Vulnerabilities

This dashboard displays the latest vulnerabilities published by the Cybersecurity & Infrastructure Security Agency (CISA).

CVE-2024-3393

Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability

Vendor: Palo Alto Networks

Product: PAN-OS

Added: 2024-12-30

Due Date: 2025-01-20

Description:

Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-754

CVE-2021-44207

Acclaim Systems USAHERDS Use of Hard-Coded Credentials Vulnerability

Vendor: Acclaim Systems

Product: USAHERDS

Added: 2024-12-23

Due Date: 2025-01-13

Description:

Acclaim Systems USAHERDS contains a hard-coded credentials vulnerability that could allow an attacker to achieve remote code execution on the system that runs the application. The MachineKey must be obtained via a separate vulnerability or other channel.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Please contact the product developer for support and vulnerability mitigation.

CWEs:

CWE-798

CVE-2024-12356

BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability

Vendor: BeyondTrust

Product: Privileged Remote Access (PRA) and Remote Support (RS)

Added: 2024-12-19

Due Date: 2024-12-27

Description:

BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain a command injection vulnerability, which can allow an unauthenticated attacker to inject commands that are run as a site user.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-77

CVE-2021-40407

Reolink RLC-410W IP Camera OS Command Injection Vulnerability

Vendor: Reolink

Product: RLC-410W IP Camera

Added: 2024-12-18

Due Date: 2025-01-08

Description:

Reolink RLC-410W IP cameras contain an authenticated OS command injection vulnerability in the device network settings functionality.

Required Action:

The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.

CWEs:

CWE-78

CVE-2019-11001

Reolink Multiple IP Cameras OS Command Injection Vulnerability

Vendor: Reolink

Product: Multiple IP Cameras

Added: 2024-12-18

Due Date: 2025-01-08

Description:

Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W IP cameras contain an authenticated OS command injection vulnerability. This vulnerability allows an authenticated admin to use the "TestEmail" functionality to inject and run OS commands as root.

Required Action:

The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.

CWEs:

CWE-78

CVE-2022-23227

NUUO NVRmini2 Devices Missing Authentication Vulnerability

Vendor: NUUO

Product: NVRmini2 Devices

Added: 2024-12-18

Due Date: 2025-01-08

Description:

NUUO NVRmini2 devices contain a missing authentication vulnerability that allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users.

Required Action:

The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

CWEs:

CWE-306

CVE-2018-14933

NUUO NVRmini Devices OS Command Injection Vulnerability

Vendor: NUUO

Product: NVRmini Devices

Added: 2024-12-18

Due Date: 2025-01-08

Description:

NUUO NVRmini devices contain an OS command injection vulnerability. This vulnerability allows remote command execution via shell metacharacters in the uploaddir parameter for a writeuploaddir command.

Required Action:

The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

CWEs:

CWE-78

CVE-2024-55956

Ransomware

Cleo Multiple Products Unauthenticated File Upload Vulnerability

Vendor: Cleo

Product: Multiple Products

Added: 2024-12-17

Due Date: 2025-01-07

Description:

Cleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload vulnerability that could allow an unauthenticated user to import and execute arbitrary bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-276

CVE-2024-35250

Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2024-12-16

Due Date: 2025-01-06

Description:

Microsoft Windows Kernel-Mode Driver contains an untrusted pointer dereference vulnerability that allows a local attacker to escalate privileges.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-822

CVE-2024-20767

Adobe ColdFusion Improper Access Control Vulnerability

Vendor: Adobe

Product: ColdFusion

Added: 2024-12-16

Due Date: 2025-01-06

Description:

Adobe ColdFusion contains an improper access control vulnerability that could allow an attacker to access or modify restricted files via an internet-exposed admin panel.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-284

CVE-2024-50623

Ransomware

Cleo Multiple Products Unrestricted File Upload Vulnerability

Vendor: Cleo

Product: Multiple Products

Added: 2024-12-13

Due Date: 2025-01-03

Description:

Cleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload and download vulnerability that can lead to remote code execution with elevated privileges.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-434

CVE-2024-49138

Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2024-12-10

Due Date: 2024-12-31

Description:

Microsoft Windows Common Log File System (CLFS) driver contains a heap-based buffer overflow vulnerability that allows a local attacker to escalate privileges.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-122

CVE-2024-51378

Ransomware

CyberPanel Incorrect Default Permissions Vulnerability

Vendor: CyberPersons

Product: CyberPanel

Added: 2024-12-04

Due Date: 2024-12-25

Description:

CyberPanel contains an incorrect default permissions vulnerability that allows for authentication bypass and the execution of arbitrary commands using shell metacharacters in the statusfile property.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-276

CVE-2024-11667

Ransomware

Zyxel Multiple Firewalls Path Traversal Vulnerability

Vendor: Zyxel

Product: Multiple Firewalls

Added: 2024-12-03

Due Date: 2024-12-24

Description:

Multiple Zyxel firewalls contain a path traversal vulnerability in the web management interface that could allow an attacker to download or upload files via a crafted URL.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-22

CVE-2024-11680

ProjectSend Improper Authentication Vulnerability

Vendor: ProjectSend

Product: ProjectSend

Added: 2024-12-03

Due Date: 2024-12-24

Description:

ProjectSend contains an improper authentication vulnerability that allows a remote, unauthenticated attacker to enable unauthorized modification of the application's configuration via crafted HTTP requests to options.php. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-287