CISA Known Exploited Vulnerabilities

This dashboard displays the latest vulnerabilities published by the Cybersecurity & Infrastructure Security Agency (CISA).

CVE-2014-6352

Microsoft Windows Code Injection Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2022-02-25

Due Date: 2022-08-25

Description:

Microsoft Windows allow remote attackers to execute arbitrary code via a crafted OLE object.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-94

CVE-2022-23131

Zabbix Frontend Authentication Bypass Vulnerability

Vendor: Zabbix

Product: Frontend

Added: 2022-02-22

Due Date: 2022-03-08

Description:

Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-290

CVE-2022-23134

Zabbix Frontend Improper Access Control Vulnerability

Vendor: Zabbix

Product: Frontend

Added: 2022-02-22

Due Date: 2022-03-08

Description:

Malicious actors can pass step checks and potentially change the configuration of Zabbix Frontend.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-284

CVE-2022-24086

Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability

Vendor: Adobe

Product: Commerce and Magento Open Source

Added: 2022-02-15

Due Date: 2022-03-01

Description:

Adobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-20

CVE-2022-0609

Google Chromium Animation Use-After-Free Vulnerability

Vendor: Google

Product: Chromium Animation

Added: 2022-02-15

Due Date: 2022-03-01

Description:

Google Chromium Animation contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-416

CVE-2019-0752

Ransomware

Microsoft Internet Explorer Type Confusion Vulnerability

Vendor: Microsoft

Product: Internet Explorer

Added: 2022-02-15

Due Date: 2022-08-15

Description:

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-843

CVE-2018-8174

Ransomware

Microsoft Windows VBScript Engine Out-of-Bounds Write Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2022-02-15

Due Date: 2022-08-15

Description:

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution"

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-787

CVE-2018-20250

Ransomware

WinRAR Absolute Path Traversal Vulnerability

Vendor: RARLAB

Product: WinRAR

Added: 2022-02-15

Due Date: 2022-08-15

Description:

WinRAR Absolute Path Traversal vulnerability leads to Remote Code Execution

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-36

CVE-2018-15982

Ransomware

Adobe Flash Player Use-After-Free Vulnerability

Vendor: Adobe

Product: Flash Player

Added: 2022-02-15

Due Date: 2022-08-15

Description:

Adobe Flash Player com.adobe.tvsdk.mediacore.metadata Use After Free Vulnerability

Required Action:

The impacted product is end-of-life and should be disconnected if still in use.

CWEs:

CWE-416

CVE-2017-9841

PHPUnit Command Injection Vulnerability

Vendor: PHPUnit

Product: PHPUnit

Added: 2022-02-15

Due Date: 2022-08-15

Description:

PHPUnit allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-94

CVE-2014-1761

Microsoft Word Memory Corruption Vulnerability

Vendor: Microsoft

Product: Word

Added: 2022-02-15

Due Date: 2022-08-15

Description:

Microsoft Word contains a memory corruption vulnerability which when exploited could allow for remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-119

CVE-2013-3906

Microsoft Graphics Component Memory Corruption Vulnerability

Vendor: Microsoft

Product: Graphics Component

Added: 2022-02-15

Due Date: 2022-08-15

Description:

Microsoft Graphics Component contains a memory corruption vulnerability which can allow for remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-94

CVE-2022-22620

Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability

Vendor: Apple

Product: iOS, iPadOS, and macOS

Added: 2022-02-11

Due Date: 2022-02-25

Description:

Apple iOS, iPadOS, and macOS WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-416

CVE-2021-36934

Microsoft Windows SAM Local Privilege Escalation Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2022-02-10

Due Date: 2022-02-24

Description:

If a Volume Shadow Copy (VSS) shadow copy of the system drive is available, users can read the SAM file which would allow any user to escalate privileges to SYSTEM level.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-1220

CVE-2020-0796

Ransomware

Microsoft SMBv3 Remote Code Execution Vulnerability

Vendor: Microsoft

Product: SMBv3

Added: 2022-02-10

Due Date: 2022-08-10

Description:

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-119