CISA Known Exploited Vulnerabilities
1549
Total KEV

Known Exploited Vulnerabilities

Track actively exploited CVEs from the CISA catalog with remediation deadlines

1530
Overdue

Showing 50 of 1549 KEV entries

View official CISA catalog

CVE-2022-38028

7.8 โš ๏ธ OVERDUE

Windows Print Spooler Elevation of Privilege Vulnerability

microsoft
Added to KEV
2024-04-23
Remediation Deadline
2024-05-14

Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38028; https://nvd.nist.gov/vuln/detail/CVE-2022-38028

CVE-2024-3400

10.0 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

paloaltonetworks
Added to KEV
2024-04-12
Remediation Deadline
2024-04-19

Notes: https://security.paloaltonetworks.com/CVE-2024-3400 ; https://nvd.nist.gov/vuln/detail/CVE-2024-3400

CVE-2024-3272

9.8 โš ๏ธ OVERDUE

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

dlink
Added to KEV
2024-04-11
Remediation Deadline
2024-05-02

Notes: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3272

CVE-2024-3273

7.3 โš ๏ธ OVERDUE

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

dlink
Added to KEV
2024-04-11
Remediation Deadline
2024-05-02

Notes: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3273

CVE-2024-29745

5.5 โš ๏ธ OVERDUE

there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

google
Added to KEV
2024-04-04
Remediation Deadline
2024-04-25

Notes: https://source.android.com/docs/security/bulletin/pixel/2024-04-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29745

CVE-2024-29748

7.8 โš ๏ธ OVERDUE

there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

google
Added to KEV
2024-04-04
Remediation Deadline
2024-04-25

Notes: https://source.android.com/docs/security/bulletin/pixel/2024-04-01; https://nvd.nist.gov/vuln/detail/CVE-2024-29748

CVE-2023-24955

7.2 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Microsoft SharePoint Server Remote Code Execution Vulnerability

microsoft
Added to KEV
2024-03-26
Remediation Deadline
2024-04-16

Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24955; https://nvd.nist.gov/vuln/detail/CVE-2023-24955

CVE-2019-7256

9.8 โš ๏ธ OVERDUE

Linear eMerge E3-Series devices allow Command Injections.

nortekcontrol
Added to KEV
2024-03-25
Remediation Deadline
2024-04-15

Notes: https://linear-solutions.com/wp-content/uploads/E3-Bulletin-06-27-2023.pdf, https://www.cisa.gov/news-events/ics-advisories/icsa-24-065-01; https://nvd.nist.gov/vuln/detail/CVE-2019-7256

CVE-2021-44529

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).

ivanti
Added to KEV
2024-03-25
Remediation Deadline
2024-04-15

Notes: https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2021-44529

CVE-2023-48788

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.

fortinet
Added to KEV
2024-03-25
Remediation Deadline
2024-04-15

Notes: https://www.fortiguard.com/psirt/FG-IR-24-007; https://nvd.nist.gov/vuln/detail/CVE-2023-48788

CVE-2024-27198

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible

jetbrains
Added to KEV
2024-03-07
Remediation Deadline
2024-03-28

Notes: https://www.jetbrains.com/help/teamcity/teamcity-2023-11-4-release-notes.html; https://nvd.nist.gov/vuln/detail/CVE-2024-27198

CVE-2024-23225

7.8 โš ๏ธ OVERDUE

A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.

apple
Added to KEV
2024-03-06
Remediation Deadline
2024-03-27

Notes: https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214083, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214085, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214087, https://support.apple.com/en-us/HT214088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23225

CVE-2024-23296

7.8 โš ๏ธ OVERDUE

A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.

apple
Added to KEV
2024-03-06
Remediation Deadline
2024-03-27

Notes: https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23296

CVE-2021-36380

9.8 โš ๏ธ OVERDUE

Sunhillo SureLine before 8.7.0.1.1 allows Unauthenticated OS Command Injection via shell metacharacters in ipAddr or dnsAddr /cgi/networkDiag.cgi.

sunhillo
Added to KEV
2024-03-05
Remediation Deadline
2024-03-26

Notes: https://www.sunhillo.com/fb011/; https://nvd.nist.gov/vuln/detail/CVE-2021-36380

CVE-2023-21237

5.5 โš ๏ธ OVERDUE

In applyRemoteView of NotificationContentInflater.java, there is a possible way to hide foreground service notification due to misleading or insufficient UI. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251586912

google
Added to KEV
2024-03-05
Remediation Deadline
2024-03-26

Notes: https://source.android.com/docs/security/bulletin/pixel/2023-06-01; https://nvd.nist.gov/vuln/detail/CVE-2023-21237

CVE-2024-21338

7.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Windows Kernel Elevation of Privilege Vulnerability

microsoft
Added to KEV
2024-03-04
Remediation Deadline
2024-03-25

Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338; https://nvd.nist.gov/vuln/detail/CVE-2024-21338

CVE-2023-29360

8.4 โš ๏ธ OVERDUE

Microsoft Streaming Service Elevation of Privilege Vulnerability

microsoft
Added to KEV
2024-02-29
Remediation Deadline
2024-03-21

Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29360 ;https://nvd.nist.gov/vuln/detail/CVE-2023-29360

CVE-2024-1709

10.0 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.

connectwise
Added to KEV
2024-02-22
Remediation Deadline
2024-02-29

Notes: https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8; https://nvd.nist.gov/vuln/detail/CVE-2024-1709

CVE-2020-3259

7.5 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve memory contents on an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. An attacker could exploit this vulnerability by sending a crafted GET request to the web services interface. A successful exploit could allow the attacker to retrieve memory contents, which could lead to the disclosure of confidential information. Note: This vulnerability affects only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section.

cisco
Added to KEV
2024-02-15
Remediation Deadline
2024-03-07

Notes: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-info-disclose-9eJtycMB; https://nvd.nist.gov/vuln/detail/CVE-2020-3259

CVE-2024-21410

9.8 โš ๏ธ OVERDUE

Microsoft Exchange Server Elevation of Privilege Vulnerability

microsoft
Added to KEV
2024-02-15
Remediation Deadline
2024-03-07

Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410; https://nvd.nist.gov/vuln/detail/CVE-2024-21410

CVE-2024-21351

7.6 โš ๏ธ OVERDUE

Windows SmartScreen Security Feature Bypass Vulnerability

microsoft
Added to KEV
2024-02-13
Remediation Deadline
2024-03-05

Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21351; https://nvd.nist.gov/vuln/detail/CVE-2024-21351

CVE-2024-21412

8.1 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Internet Shortcut Files Security Feature Bypass Vulnerability

microsoft
Added to KEV
2024-02-13
Remediation Deadline
2024-03-05

Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21412; https://nvd.nist.gov/vuln/detail/CVE-2024-21412

CVE-2023-43770

6.1 โš ๏ธ OVERDUE

Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.

debian roundcube
Added to KEV
2024-02-12
Remediation Deadline
2024-03-04

Notes: https://roundcube.net/news/2023/09/15/security-update-1.6.3-released ; https://nvd.nist.gov/vuln/detail/CVE-2023-43770

CVE-2024-21762

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests

fortinet
Added to KEV
2024-02-09
Remediation Deadline
2024-02-16

Notes: https://fortiguard.fortinet.com/psirt/FG-IR-24-015 ; https://nvd.nist.gov/vuln/detail/CVE-2024-21762

CVE-2023-4762

8.8 โš ๏ธ OVERDUE

Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

debian google microsoft +1
Added to KEV
2024-02-06
Remediation Deadline
2024-02-27

Notes: https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html; https://nvd.nist.gov/vuln/detail/CVE-2023-4762

CVE-2022-48618

7.0 โš ๏ธ OVERDUE

The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1.

apple
Added to KEV
2024-01-31
Remediation Deadline
2024-02-21

Notes: https://support.apple.com/en-us/HT213530, https://support.apple.com/en-us/HT213532, https://support.apple.com/en-us/HT213535, https://support.apple.com/en-us/HT213536; https://nvd.nist.gov/vuln/detail/CVE-2022-48618

CVE-2024-21893

8.2 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

ivanti
Added to KEV
2024-01-31
Remediation Deadline
2024-02-02

Notes: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-21893

CVE-2023-22527

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action. Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassianโ€™s January Security Bulletin.

atlassian
Added to KEV
2024-01-24
Remediation Deadline
2024-02-14

Notes: https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22527

CVE-2024-23222

8.8 โš ๏ธ OVERDUE

A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3, iOS 16.7.5 and iPadOS 16.7.5, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.

apple
Added to KEV
2024-01-23
Remediation Deadline
2024-02-13

Notes: https://support.apple.com/en-us/HT214055, https://support.apple.com/en-us/HT214056, https://support.apple.com/en-us/HT214057, https://support.apple.com/en-us/HT214058, https://support.apple.com/en-us/HT214059, https://support.apple.com/en-us/HT214061, https://support.apple.com/en-us/HT214063 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23222

CVE-2023-34048

9.8 โš ๏ธ OVERDUE

vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.ย A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.

vmware
Added to KEV
2024-01-22
Remediation Deadline
2024-02-12

Notes: https://www.vmware.com/security/advisories/VMSA-2023-0023.html; https://nvd.nist.gov/vuln/detail/CVE-2023-34048

CVE-2023-35082

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier.

ivanti
Added to KEV
2024-01-18
Remediation Deadline
2024-02-08

Notes: https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older; https://nvd.nist.gov/vuln/detail/CVE-2023-35082

CVE-2024-0519

8.8 โš ๏ธ OVERDUE

Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

google couchbase fedoraproject
Added to KEV
2024-01-17
Remediation Deadline
2024-02-07

Notes: https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html; https://nvd.nist.gov/vuln/detail/CVE-2024-0519

CVE-2023-6548

5.5 โš ๏ธ OVERDUE

Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gatewayย allows an attacker withย accessย to NSIP, CLIP or SNIP with management interface to performย Authenticated (low privileged) remote code execution on Management Interface.

citrix
Added to KEV
2024-01-17
Remediation Deadline
2024-01-24

Notes: https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549; https://nvd.nist.gov/vuln/detail/CVE-2023-6548

CVE-2023-6549

8.2 โš ๏ธ OVERDUE

Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service andย Out-Of-Bounds Memory Read

citrix
Added to KEV
2024-01-17
Remediation Deadline
2024-02-07

Notes: https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549; https://nvd.nist.gov/vuln/detail/CVE-2023-6549

CVE-2018-15133

8.1 โš ๏ธ OVERDUE

In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.

laravel
Added to KEV
2024-01-16
Remediation Deadline
2024-02-06

Notes: https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30; https://nvd.nist.gov/vuln/detail/CVE-2018-15133

CVE-2023-29357

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Microsoft SharePoint Server Elevation of Privilege Vulnerability

microsoft
Added to KEV
2024-01-10
Remediation Deadline
2024-01-31

Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29357; https://nvd.nist.gov/vuln/detail/CVE-2023-29357

CVE-2023-46805

8.2 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.

ivanti
Added to KEV
2024-01-10
Remediation Deadline
2024-01-22

Notes: Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-46805

CVE-2024-21887

9.1 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

ivanti
Added to KEV
2024-01-10
Remediation Deadline
2024-01-22

Notes: Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-21887

CVE-2016-20017

9.8 โš ๏ธ OVERDUE

D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022.

dlink
Added to KEV
2024-01-08
Remediation Deadline
2024-01-29

Notes: https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088; https://nvd.nist.gov/vuln/detail/CVE-2016-20017

CVE-2023-23752

5.3 โš ๏ธ OVERDUE

An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.

joomla
Added to KEV
2024-01-08
Remediation Deadline
2024-01-29

Notes: https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html; https://nvd.nist.gov/vuln/detail/CVE-2023-23752

CVE-2023-27524

8.9 โš ๏ธ OVERDUE

Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY> Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.

apache
Added to KEV
2024-01-08
Remediation Deadline
2024-01-29

Notes: https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk; https://nvd.nist.gov/vuln/detail/CVE-2023-27524

CVE-2023-29300

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.

adobe
Added to KEV
2024-01-08
Remediation Deadline
2024-01-29

Notes: https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html; https://nvd.nist.gov/vuln/detail/CVE-2023-29300

CVE-2023-38203

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Adobe ColdFusion versions 2018u17 (and earlier), 2021u7 (and earlier) and 2023u1 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.

adobe
Added to KEV
2024-01-08
Remediation Deadline
2024-01-29

Notes: https://helpx.adobe.com/security/products/coldfusion/apsb23-41.html ; https://nvd.nist.gov/vuln/detail/CVE-2023-38203

CVE-2023-41990

7.8 โš ๏ธ OVERDUE

The issue was addressed with improved handling of caches. This issue is fixed in tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3. Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.

apple
Added to KEV
2024-01-08
Remediation Deadline
2024-01-29

Notes: https://support.apple.com/en-us/HT213599, https://support.apple.com/en-us/HT213601, https://support.apple.com/en-us/HT213605, https://support.apple.com/en-us/HT213606, https://support.apple.com/en-us/HT213842, https://support.apple.com/en-us/HT213844, https://support.apple.com/en-us/HT213845 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41990

CVE-2023-7024

8.8 โš ๏ธ OVERDUE

Heap buffer overflow in WebRTC in Google Chrome prior to 120.0.6099.129 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

debian google fedoraproject
Added to KEV
2024-01-02
Remediation Deadline
2024-01-23

Notes: This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html; https://nvd.nist.gov/vuln/detail/CVE-2023-7024

CVE-2023-7101

7.8 โš ๏ธ OVERDUE

Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type โ€œevalโ€. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.

debian jmcnamara fedoraproject
Added to KEV
2024-01-02
Remediation Deadline
2024-01-23

Notes: This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://metacpan.org/dist/Spreadsheet-ParseExcel and Barracuda's specific implementation and fix for their downstream issue CVE-2023-7102 at https://www.barracuda.com/company/legal/esg-vulnerability; https://nvd.nist.gov/vuln/detail/CVE-2023-7101

CVE-2023-49897

8.8 โš ๏ธ OVERDUE

An OS command injection vulnerability exists in AE1021PE firmware version 2.0.9 and earlier and AE1021 firmware version 2.0.9 and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker who can log in to the product.

fxc
Added to KEV
2023-12-21
Remediation Deadline
2024-01-11

Notes: https://www.fxc.jp/news/20231206 ; https://nvd.nist.gov/vuln/detail/CVE-2023-49897

CVE-2023-47565

8.0 โš ๏ธ OVERDUE

An OS command injection vulnerability has been found to affect legacy QNAP VioStor NVR models running QVR Firmware 4.x. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following versions: QVR Firmware 5.0.0ย and later

qnap
Added to KEV
2023-12-21
Remediation Deadline
2024-01-11

Notes: https://www.qnap.com/en/security-advisory/qsa-23-48 ; https://nvd.nist.gov/vuln/detail/CVE-2023-47565

CVE-2023-6448

9.8 โš ๏ธ OVERDUE

Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.

unitronics
Added to KEV
2023-12-11
Remediation Deadline
2023-12-18

Notes: Note that while it is possible to change the default password, implementors are encouraged to remove affected controllers from public networks and update the affected firmware: https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf; https://nvd.nist.gov/vuln/detail/CVE-2023-6448

CVE-2023-41265

9.6 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.

qlik
Added to KEV
2023-12-07
Remediation Deadline
2023-12-28

Notes: https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801; https://nvd.nist.gov/vuln/detail/CVE-2023-41265