CISA Known Exploited Vulnerabilities

This dashboard displays the latest vulnerabilities published by the Cybersecurity & Infrastructure Security Agency (CISA).

CVE-2018-13374

Ransomware

Fortinet FortiOS and FortiADC Improper Access Control Vulnerability

Vendor: Fortinet

Product: FortiOS and FortiADC

Added: 2022-09-08

Due Date: 2022-09-29

Description:

Fortinet FortiOS and FortiADC contain an improper access control vulnerability that allows attackers to obtain the LDAP server login credentials configured in FortiGate by pointing a LDAP server connectivity test request to a rogue LDAP server.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-732

CVE-2017-5521

NETGEAR Multiple Devices Exposure of Sensitive Information Vulnerability

Vendor: NETGEAR

Product: Multiple Devices

Added: 2022-09-08

Due Date: 2022-09-29

Description:

Multiple NETGEAR devices are prone to admin password disclosure via simple crafted requests to the web management server.

Required Action:

Apply updates per vendor instructions. If the affected device has since entered end-of-life, it should be disconnected if still in use.

CWEs:

CWE-200

CVE-2011-4723

D-Link DIR-300 Router Cleartext Storage of a Password Vulnerability

Vendor: D-Link

Product: DIR-300 Router

Added: 2022-09-08

Due Date: 2022-09-29

Description:

The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information.

Required Action:

The impacted product is end-of-life and should be disconnected if still in use.

CWEs:

CWE-310

CVE-2011-1823

Android OS Privilege Escalation Vulnerability

Vendor: Android

Product: Android OS

Added: 2022-09-08

Due Date: 2022-09-29

Description:

The vold volume manager daemon in Android kernel trusts messages from a PF_NETLINK socket, which allows an attacker to execute code and gain root privileges. This vulnerability is associated with GingerBreak and Exploit.AndroidOS.Lotoor.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-189

CVE-2022-26352

Ransomware

dotCMS Unrestricted Upload of File Vulnerability

Vendor: dotCMS

Product: dotCMS

Added: 2022-08-25

Due Date: 2022-09-15

Description:

dotCMS ContentResource API contains an unrestricted upload of file with a dangerous type vulnerability that allows for directory traversal, in which the file is saved outside of the intended storage location. Exploitation allows for remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-22 CWE-138

CVE-2022-24706

Apache CouchDB Insecure Default Initialization of Resource Vulnerability

Vendor: Apache

Product: CouchDB

Added: 2022-08-25

Due Date: 2022-09-15

Description:

Apache CouchDB contains an insecure default initialization of resource vulnerability which can allow an attacker to escalate to administrative privileges.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-1188

CVE-2022-24112

Apache APISIX Authentication Bypass Vulnerability

Vendor: Apache

Product: APISIX

Added: 2022-08-25

Due Date: 2022-09-15

Description:

Apache APISIX contains an authentication bypass vulnerability that allows for remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-290

CVE-2022-22963

VMware Tanzu Spring Cloud Function Remote Code Execution Vulnerability

Vendor: VMware Tanzu

Product: Spring Cloud

Added: 2022-08-25

Due Date: 2022-09-15

Description:

When using routing functionality in VMware Tanzu's Spring Cloud Function, it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-94

CVE-2022-2294

Ransomware

WebRTC Heap Buffer Overflow Vulnerability

Vendor: WebRTC

Product: WebRTC

Added: 2022-08-25

Due Date: 2022-09-15

Description:

WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows an attacker to perform shellcode execution. This vulnerability impacts web browsers using WebRTC including but not limited to Google Chrome.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-122

CVE-2021-39226

Grafana Authentication Bypass Vulnerability

Vendor: Grafana Labs

Product: Grafana

Added: 2022-08-25

Due Date: 2022-09-15

Description:

Grafana contains an authentication bypass vulnerability that allows authenticated and unauthenticated users to view and delete all snapshot data, potentially resulting in complete snapshot data loss.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-287

CVE-2021-38406

Delta Electronics DOPSoft 2 Improper Input Validation Vulnerability

Vendor: Delta Electronics

Product: DOPSoft 2

Added: 2022-08-25

Due Date: 2022-09-15

Description:

Delta Electronics DOPSoft 2 lacks proper validation of user-supplied data when parsing specific project files (improper input validation) resulting in an out-of-bounds write that allows for code execution.

Required Action:

The impacted product is end-of-life and should be disconnected if still in use.

CWEs:

CWE-787

CVE-2021-31010

Apple iOS, macOS, watchOS Sandbox Bypass Vulnerability

Vendor: Apple

Product: iOS, macOS, watchOS

Added: 2022-08-25

Due Date: 2022-09-15

Description:

In affected versions of Apple iOS, macOS, and watchOS, a sandboxed process may be able to circumvent sandbox restrictions.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-20 CWE-502

CVE-2020-36193

PEAR Archive_Tar Improper Link Resolution Vulnerability

Vendor: PEAR

Product: Archive_Tar

Added: 2022-08-25

Due Date: 2022-09-15

Description:

PEAR Archive_Tar Tar.php allows write operations with directory traversal due to inadequate checking of symbolic links. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-22 CWE-59

CVE-2020-28949

PEAR Archive_Tar Deserialization of Untrusted Data Vulnerability

Vendor: PEAR

Product: Archive_Tar

Added: 2022-08-25

Due Date: 2022-09-15

Description:

PEAR Archive_Tar allows an unserialization attack because phar: is blocked but PHAR: is not blocked. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-74

CVE-2022-0028

Palo Alto Networks PAN-OS Reflected Amplification Denial-of-Service Vulnerability

Vendor: Palo Alto Networks

Product: PAN-OS

Added: 2022-08-22

Due Date: 2022-09-12

Description:

A Palo Alto Networks PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-940