CISA Known Exploited Vulnerabilities

This dashboard displays the latest vulnerabilities published by the Cybersecurity & Infrastructure Security Agency (CISA).

CVE-2022-48618

Apple Multiple Products Memory Corruption Vulnerability

Vendor: Apple

Product: Multiple Products

Added: 2024-01-31

Due Date: 2024-02-21

Description:

Apple iOS, iPadOS, macOS, tvOS, and watchOS contain a time-of-check/time-of-use (TOCTOU) memory corruption vulnerability that allows an attacker with read and write capabilities to bypass Pointer Authentication.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-367

CVE-2024-21893

Ransomware

Ivanti Connect Secure, Policy Secure, and Neurons Server-Side Request Forgery (SSRF) Vulnerability

Vendor: Ivanti

Product: Connect Secure, Policy Secure, and Neurons

Added: 2024-01-31

Due Date: 2024-02-02

Description:

Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure), Ivanti Policy Secure, and Ivanti Neurons contain a server-side request forgery (SSRF) vulnerability in the SAML component that allows an attacker to access certain restricted resources without authentication.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-918

CVE-2023-22527

Ransomware

Atlassian Confluence Data Center and Server Template Injection Vulnerability

Vendor: Atlassian

Product: Confluence Data Center and Server

Added: 2024-01-24

Due Date: 2024-02-14

Description:

Atlassian Confluence Data Center and Server contain an unauthenticated OGNL template injection vulnerability that can lead to remote code execution.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-74

CVE-2024-23222

Apple Multiple Products WebKit Type Confusion Vulnerability

Vendor: Apple

Product: Multiple Products

Added: 2024-01-23

Due Date: 2024-02-13

Description:

Apple iOS, iPadOS, macOS, tvOS, and Safari WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-843

CVE-2023-34048

VMware vCenter Server Out-of-Bounds Write Vulnerability

Vendor: VMware

Product: vCenter Server

Added: 2024-01-22

Due Date: 2024-02-12

Description:

VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol that allows an attacker to conduct remote code execution.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-787

CVE-2023-35082

Ransomware

Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core Authentication Bypass Vulnerability

Vendor: Ivanti

Product: Endpoint Manager Mobile (EPMM) and MobileIron Core

Added: 2024-01-18

Due Date: 2024-02-08

Description:

Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core contain an authentication bypass vulnerability that allows unauthorized users to access restricted functionality or resources of the application.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-287

CVE-2024-0519

Google Chromium V8 Out-of-Bounds Memory Access Vulnerability

Vendor: Google

Product: Chromium V8

Added: 2024-01-17

Due Date: 2024-02-07

Description:

Google Chromium V8 Engine contains an out-of-bounds memory access vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-787

CVE-2023-6549

Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability

Vendor: Citrix

Product: NetScaler ADC and NetScaler Gateway

Added: 2024-01-17

Due Date: 2024-02-07

Description:

Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for a denial-of-service when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-119

CVE-2023-6548

Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability

Vendor: Citrix

Product: NetScaler ADC and NetScaler Gateway

Added: 2024-01-17

Due Date: 2024-01-24

Description:

Citrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-94

CVE-2018-15133

Laravel Deserialization of Untrusted Data Vulnerability

Vendor: Laravel

Product: Laravel Framework

Added: 2024-01-16

Due Date: 2024-02-06

Description:

Laravel Framework contains a deserialization of untrusted data vulnerability, allowing for remote command execution. This vulnerability may only be exploited if a malicious user has accessed the application encryption key (APP_KEY environment variable).

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-502

CVE-2023-29357

Ransomware

Microsoft SharePoint Server Privilege Escalation Vulnerability

Vendor: Microsoft

Product: SharePoint Server

Added: 2024-01-10

Due Date: 2024-01-31

Description:

Microsoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spoofed JWT authentication tokens, to use them for executing a network attack. This attack bypasses authentication, enabling the attacker to gain administrator privileges.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-303

CVE-2023-46805

Ransomware

Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability

Vendor: Ivanti

Product: Connect Secure and Policy Secure

Added: 2024-01-10

Due Date: 2024-01-22

Description:

Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-287

CVE-2024-21887

Ransomware

Ivanti Connect Secure and Policy Secure Command Injection Vulnerability

Vendor: Ivanti

Product: Connect Secure and Policy Secure

Added: 2024-01-10

Due Date: 2024-01-22

Description:

Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure contain a command injection vulnerability in the web components of these products, which can allow an authenticated administrator to send crafted requests to execute code on affected appliances. This vulnerability can be leveraged in conjunction with CVE-2023-46805, an authenticated bypass issue.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-77

CVE-2023-23752

Joomla! Improper Access Control Vulnerability

Vendor: Joomla!

Product: Joomla!

Added: 2024-01-08

Due Date: 2024-01-29

Description:

Joomla! contains an improper access control vulnerability that allows unauthorized access to webservice endpoints.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-284

CVE-2016-20017

D-Link DSL-2750B Devices Command Injection Vulnerability

Vendor: D-Link

Product: DSL-2750B Devices

Added: 2024-01-08

Due Date: 2024-01-29

Description:

D-Link DSL-2750B devices contain a command injection vulnerability that allows remote, unauthenticated command injection via the login.cgi cli parameter.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-77