CISA Known Exploited Vulnerabilities

This dashboard displays the latest vulnerabilities published by the Cybersecurity & Infrastructure Security Agency (CISA).

CVE-2024-21287

Oracle Agile Product Lifecycle Management (PLM) Incorrect Authorization Vulnerability

Vendor: Oracle

Product: Agile Product Lifecycle Management (PLM)

Added: 2024-11-21

Due Date: 2024-12-12

Description:

Oracle Agile Product Lifecycle Management (PLM) contains an incorrect authorization vulnerability in the Process Extension component of the Software Development Kit. Successful exploitation of this vulnerability may result in unauthenticated file disclosure.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-863

CVE-2024-44309

Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability

Vendor: Apple

Product: Multiple Products

Added: 2024-11-21

Due Date: 2024-12-12

Description:

Apple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to a cross-site scripting (XSS) attack.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-79

CVE-2024-44308

Apple Multiple Products Code Execution Vulnerability

Vendor: Apple

Product: Multiple Products

Added: 2024-11-21

Due Date: 2024-12-12

Description:

Apple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to arbitrary code execution.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CVE-2024-38813

VMware vCenter Server Privilege Escalation Vulnerability

Vendor: VMware

Product: vCenter Server

Added: 2024-11-20

Due Date: 2024-12-11

Description:

VMware vCenter contains an improper check for dropped privileges vulnerability. This vulnerability could allow an attacker with network access to the vCenter Server to escalate privileges to root by sending a specially crafted packet.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-250 CWE-273

CVE-2024-38812

VMware vCenter Server Heap-Based Buffer Overflow Vulnerability

Vendor: VMware

Product: vCenter Server

Added: 2024-11-20

Due Date: 2024-12-11

Description:

VMware vCenter Server contains a heap-based buffer overflow vulnerability in the implementation of the DCERPC protocol. This vulnerability could allow an attacker with network access to the vCenter Server to execute remote code by sending a specially crafted packet.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-122

CVE-2024-9474

Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability

Vendor: Palo Alto Networks

Product: PAN-OS

Added: 2024-11-18

Due Date: 2024-12-09

Description:

Palo Alto Networks PAN-OS contains an OS command injection vulnerability that allows for privilege escalation through the web-based management interface for several PAN products, including firewalls and VPN concentrators.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management interfaces for affected devices should not be exposed to untrusted networks, including the internet.

CWEs:

CWE-77

CVE-2024-0012

Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability

Vendor: Palo Alto Networks

Product: PAN-OS

Added: 2024-11-18

Due Date: 2024-12-09

Description:

Palo Alto Networks PAN-OS contains an authentication bypass vulnerability in the web-based management interface for several PAN-OS products, including firewalls and VPN concentrators.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be exposed to untrusted networks, including the internet.

CWEs:

CWE-306

CVE-2024-1212

Progress Kemp LoadMaster OS Command Injection Vulnerability

Vendor: Progress

Product: Kemp LoadMaster

Added: 2024-11-18

Due Date: 2024-12-09

Description:

Progress Kemp LoadMaster contains an OS command injection vulnerability that allows an unauthenticated, remote attacker to access the system through the LoadMaster management interface, enabling arbitrary system command execution.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-78

CVE-2024-9465

Palo Alto Networks Expedition SQL Injection Vulnerability

Vendor: Palo Alto Networks

Product: Expedition

Added: 2024-11-14

Due Date: 2024-12-05

Description:

Palo Alto Networks Expedition contains a SQL injection vulnerability that allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-89

CVE-2024-9463

Palo Alto Networks Expedition OS Command Injection Vulnerability

Vendor: Palo Alto Networks

Product: Expedition

Added: 2024-11-14

Due Date: 2024-12-05

Description:

Palo Alto Networks Expedition contains an OS command injection vulnerability that allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-78

CVE-2021-26086

Atlassian Jira Server and Data Center Path Traversal Vulnerability

Vendor: Atlassian

Product: Jira Server and Data Center

Added: 2024-11-12

Due Date: 2024-12-03

Description:

Atlassian Jira Server and Data Center contain a path traversal vulnerability that allows a remote attacker to read particular files in the /WEB-INF/web.xml endpoint.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-22

CVE-2014-2120

Cisco Adaptive Security Appliance (ASA) Cross-Site Scripting (XSS) Vulnerability

Vendor: Cisco

Product: Adaptive Security Appliance (ASA)

Added: 2024-11-12

Due Date: 2024-12-03

Description:

Cisco Adaptive Security Appliance (ASA) contains a cross-site scripting (XSS) vulnerability in the WebVPN login page. This vulnerability allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-79

CVE-2021-41277

Metabase GeoJSON API Local File Inclusion Vulnerability

Vendor: Metabase

Product: Metabase

Added: 2024-11-12

Due Date: 2024-12-03

Description:

Metabase contains a local file inclusion vulnerability in the custom map support in the API to read GeoJSON formatted data.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-200

CVE-2024-43451

Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2024-11-12

Due Date: 2024-12-03

Description:

Microsoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-73

CVE-2024-49039

Microsoft Windows Task Scheduler Privilege Escalation Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2024-11-12

Due Date: 2024-12-03

Description:

Microsoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions.

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-287