CISA Known Exploited Vulnerabilities

This dashboard displays the latest vulnerabilities published by the Cybersecurity & Infrastructure Security Agency (CISA).

CVE-2022-41040

Ransomware

Microsoft Exchange Server Server-Side Request Forgery Vulnerability

Vendor: Microsoft

Product: Exchange Server

Added: 2022-09-30

Due Date: 2022-10-21

Description:

Microsoft Exchange Server allows for server-side request forgery. Dubbed "ProxyNotShell," this vulnerability is chainable with CVE-2022-41082 which allows for remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-918

CVE-2022-36804

Atlassian Bitbucket Server and Data Center Command Injection Vulnerability

Vendor: Atlassian

Product: Bitbucket Server and Data Center

Added: 2022-09-30

Due Date: 2022-10-21

Description:

Multiple API endpoints of Atlassian Bitbucket Server and Data Center contain a command injection vulnerability where an attacker with access to a public Bitbucket repository, or with read permissions to a private one, can execute code by sending a malicious HTTP request.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-78 CWE-88 CWE-158

CVE-2022-3236

Sophos Firewall Code Injection Vulnerability

Vendor: Sophos

Product: Firewall

Added: 2022-09-23

Due Date: 2022-10-14

Description:

A code injection vulnerability in the User Portal and Webadmin of Sophos Firewall allows for remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-94

CVE-2022-35405

Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability

Vendor: Zoho

Product: ManageEngine

Added: 2022-09-22

Due Date: 2022-10-13

Description:

Zoho ManageEngine PAM360, Password Manager Pro, and Access Manager Plus contain an unspecified vulnerability that allows for remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-502

CVE-2022-40139

Trend Micro Apex One and Apex One as a Service Improper Validation Vulnerability

Vendor: Trend Micro

Product: Apex One and Apex One as a Service

Added: 2022-09-15

Due Date: 2022-10-06

Description:

Trend Micro Apex One and Apex One as a Service contain an improper validation of rollback mechanism components that could lead to remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-353 CWE-641

CVE-2013-6282

Linux Kernel Improper Input Validation Vulnerability

Vendor: Linux

Product: Kernel

Added: 2022-09-15

Due Date: 2022-10-06

Description:

The get_user and put_user API functions of the Linux kernel fail to validate the target address when being used on ARM v6k/v7 platforms. This allows an application to read and write kernel memory which could lead to privilege escalation.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-20

CVE-2013-2597

Code Aurora ACDB Audio Driver Stack-based Buffer Overflow Vulnerability

Vendor: Code Aurora

Product: ACDB Audio Driver

Added: 2022-09-15

Due Date: 2022-10-06

Description:

The Code Aurora audio calibration database (acdb) audio driver contains a stack-based buffer overflow vulnerability that allows for privilege escalation. Code Aurora is used in third-party products such as Qualcomm and Android.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-119

CVE-2013-2596

Linux Kernel Integer Overflow Vulnerability

Vendor: Linux

Product: Kernel

Added: 2022-09-15

Due Date: 2022-10-06

Description:

Linux kernel fb_mmap function in drivers/video/fbmem.c contains an integer overflow vulnerability that allows for privilege escalation.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-189

CVE-2013-2094

Linux Kernel Privilege Escalation Vulnerability

Vendor: Linux

Product: Kernel

Added: 2022-09-15

Due Date: 2022-10-06

Description:

Linux kernel fails to check all 64 bits of attr.config passed by user space, resulting to out-of-bounds access of the perf_swevent_enabled array in sw_perf_event_destroy(). Explotation allows for privilege escalation.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-189

CVE-2010-2568

Microsoft Windows Remote Code Execution Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2022-09-15

Due Date: 2022-10-06

Description:

Microsoft Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the operating system displays the icon of a malicious shortcut file. An attacker who successfully exploited this vulnerability could execute code as the logged-on user.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-20

CVE-2022-37969

Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2022-09-14

Due Date: 2022-10-05

Description:

Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-20 CWE-787

CVE-2022-32917

Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability

Vendor: Apple

Product: iOS, iPadOS, and macOS

Added: 2022-09-14

Due Date: 2022-10-05

Description:

Apple kernel, which is included in iOS, iPadOS, and macOS, contains an unspecified vulnerability where an application may be able to execute code with kernel privileges.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-20 CWE-787

CVE-2022-3075

Google Chromium Mojo Insufficient Data Validation Vulnerability

Vendor: Google

Product: Chromium Mojo

Added: 2022-09-08

Due Date: 2022-09-29

Description:

Google Chromium Mojo contains an insufficient data validation vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-20

CVE-2022-27593

Ransomware

QNAP Photo Station Externally Controlled Reference Vulnerability

Vendor: QNAP

Product: Photo Station

Added: 2022-09-08

Due Date: 2022-09-29

Description:

Certain QNAP NAS running Photo Station with internet exposure contain an externally controlled reference to a resource vulnerability which can allow an attacker to modify system files. This vulnerability was observed being utilized in a Deadbolt ransomware campaign.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-610

CVE-2022-26258

D-Link DIR-820L Remote Code Execution Vulnerability

Vendor: D-Link

Product: DIR-820L

Added: 2022-09-08

Due Date: 2022-09-29

Description:

D-Link DIR-820L contains an unspecified vulnerability in Device Name parameter in /lan.asp which allows for remote code execution.

Required Action:

The impacted product is end-of-life and should be disconnected if still in use.

CWEs:

CWE-78