CISA Known Exploited Vulnerabilities
1483
Total KEV

Known Exploited Vulnerabilities

Track actively exploited CVEs from the CISA catalog with remediation deadlines

1472
Overdue

Showing 50 of 1472 KEV entries

View official CISA catalog

CVE-2017-6627

7.5 ⚠️ OVERDUE

A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-6627

CVE-2017-12231

7.5 ⚠️ OVERDUE

A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper translation of H.323 messages that use the Registration, Admission, and Status (RAS) protocol and are sent to an affected device via IPv4 packets. An attacker could exploit this vulnerability by sending a crafted H.323 RAS packet through an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to use an application layer gateway with NAT (NAT ALG) for H.323 RAS messages. By default, a NAT ALG is enabled for H.323 RAS messages. Cisco Bug IDs: CSCvc57217.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-12231

CVE-2017-12232

6.5 ⚠️ OVERDUE

A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-12232

CVE-2017-12233

7.5 ⚠️ OVERDUE

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-12233

CVE-2017-12234

7.5 ⚠️ OVERDUE

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc43709.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-12234

CVE-2017-12235

7.5 ⚠️ OVERDUE

A vulnerability in the implementation of the PROFINET Discovery and Configuration Protocol (PN-DCP) for Cisco IOS 12.2 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper parsing of ingress PN-DCP Identify Request packets destined to an affected device. An attacker could exploit this vulnerability by sending a crafted PN-DCP Identify Request packet to an affected device and then continuing to send normal PN-DCP Identify Request packets to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to process PROFINET messages. Beginning with Cisco IOS Software Release 12.2(52)SE, PROFINET is enabled by default on all the base switch module and expansion-unit Ethernet ports. Cisco Bug IDs: CSCuz47179.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-12235

CVE-2017-12237

7.5 ⚠️ OVERDUE

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-12237

CVE-2017-12238

6.5 ⚠️ OVERDUE

A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS 15.0 through 15.4 for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, adjacent attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory management issue in the affected software. An attacker could exploit this vulnerability by creating a large number of VPLS-generated MAC entries in the MAC address table of an affected device. A successful exploit could allow the attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a DoS condition. This vulnerability affects Cisco Catalyst 6800 Series Switches that are running a vulnerable release of Cisco IOS Software and have a Cisco C6800-16P10G or C6800-16P10G-XL line card in use with Supervisor Engine 6T. To be vulnerable, the device must also be configured with VPLS and the C6800-16P10G or C6800-16P10G-XL line card needs to be the core-facing MPLS interfaces. Cisco Bug IDs: CSCva61927.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-12238

CVE-2017-12240

9.8 ⚠️ OVERDUE

The DHCP relay subsystem of Cisco IOS 12.2 through 15.6 and Cisco IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a buffer overflow condition in the DHCP relay subsystem of the affected software. An attacker could exploit this vulnerability by sending a crafted DHCP Version 4 (DHCPv4) packet to an affected system. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a DoS condition. Cisco Bug IDs: CSCsm45390, CSCuw77959.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-12240

CVE-2017-11826

7.8 ⚠️ OVERDUE

Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Services, and Office Online Server allow remote code execution when the software fails to properly handle objects in memory.

microsoft
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-11826

CVE-2017-11292

8.8 ⚠️ OVERDUE

Adobe Flash Player version 27.0.0.159 and earlier has a flawed bytecode verification procedure, which allows for an untrusted value to be used in the calculation of an array index. This can lead to type confusion, and successful exploitation could lead to arbitrary code execution.

redhat adobe linux +3
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-11292

CVE-2017-12319

5.9 ⚠️ OVERDUE

A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. This vulnerability affects all releases of Cisco IOS XE Software prior to software release 16.3 that support BGP EVPN configurations. If the device is not configured for EVPN, it is not vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-12319

CVE-2018-0151

9.8 ⚠️ OVERDUE

A vulnerability in the quality of service (QoS) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges. The vulnerability is due to incorrect bounds checking of certain values in packets that are destined for UDP port 18999 of an affected device. An attacker could exploit this vulnerability by sending malicious packets to an affected device. When the packets are processed, an exploitable buffer overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code on the affected device with elevated privileges. The attacker could also leverage this vulnerability to cause the device to reload, causing a temporary DoS condition while the device is reloading. The malicious packets must be destined to and processed by an affected device. Traffic transiting a device will not trigger the vulnerability. Cisco Bug IDs: CSCvf73881.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0151

CVE-2018-0154

7.5 ⚠️ OVERDUE

A vulnerability in the crypto engine of the Cisco Integrated Services Module for VPN (ISM-VPN) running Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of VPN traffic by the affected device. An attacker could exploit this vulnerability by sending crafted VPN traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to hang or crash, resulting in a DoS condition. Cisco Bug IDs: CSCvd39267.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0154

CVE-2018-0155

8.6 ⚠️ OVERDUE

A vulnerability in the Bidirectional Forwarding Detection (BFD) offload implementation of Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to cause a crash of the iosd process, causing a denial of service (DoS) condition. The vulnerability is due to insufficient error handling when the BFD header in a BFD packet is incomplete. An attacker could exploit this vulnerability by sending a crafted BFD message to or across an affected switch. A successful exploit could allow the attacker to trigger a reload of the system. This vulnerability affects Catalyst 4500 Supervisor Engine 6-E (K5), Catalyst 4500 Supervisor Engine 6L-E (K10), Catalyst 4500 Supervisor Engine 7-E (K10), Catalyst 4500 Supervisor Engine 7L-E (K10), Catalyst 4500E Supervisor Engine 8-E (K10), Catalyst 4500E Supervisor Engine 8L-E (K10), Catalyst 4500E Supervisor Engine 9-E (K10), Catalyst 4500-X Series Switches (K10), Catalyst 4900M Switch (K5), Catalyst 4948E Ethernet Switch (K5). Cisco Bug IDs: CSCvc40729.

rockwellautomation cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0155

CVE-2018-0156

7.5 ⚠️ OVERDUE

A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0156

CVE-2018-0158

8.6 ⚠️ OVERDUE

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device to be processed. A successful exploit could cause an affected device to continuously consume memory and eventually reload, resulting in a DoS condition. Cisco Bug IDs: CSCvf22394.

rockwellautomation cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0158

CVE-2018-0159

7.5 ⚠️ OVERDUE

A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0159

CVE-2018-0161

6.3 ⚠️ OVERDUE

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software running on certain models of Cisco Catalyst Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition, aka a GET MIB Object ID Denial of Service Vulnerability. The vulnerability is due to a condition that could occur when the affected software processes an SNMP read request that contains a request for the ciscoFlashMIB object ID (OID). An attacker could trigger this vulnerability by issuing an SNMP GET request for the ciscoFlashMIB OID on an affected device. A successful exploit could cause the affected device to restart due to a SYS-3-CPUHOG. This vulnerability affects the following Cisco devices if they are running a vulnerable release of Cisco IOS Software and are configured to use SNMP Version 2 (SNMPv2) or SNMP Version 3 (SNMPv3): Cisco Catalyst 2960-L Series Switches, Cisco Catalyst Digital Building Series Switches 8P, Cisco Catalyst Digital Building Series Switches 8U. Cisco Bug IDs: CSCvd89541.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0161

CVE-2018-0167

8.8 ⚠️ OVERDUE

Multiple Buffer Overflow vulnerabilities in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. Cisco Bug IDs: CSCuo17183, CSCvd73487.

rockwellautomation cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0167

CVE-2018-0172

8.6 ⚠️ OVERDUE

A vulnerability in the DHCP option 82 encapsulation functionality of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software performs incomplete input validation of option 82 information that it receives in DHCP Version 4 (DHCPv4) packets from DHCP relay agents. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow condition on the affected device, which will cause the device to reload and result in a DoS condition. Cisco Bug IDs: CSCvg62730.

rockwellautomation cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0172

CVE-2018-0173

8.6 ⚠️ OVERDUE

A vulnerability in the Cisco IOS Software and Cisco IOS XE Software function that restores encapsulated option 82 information in DHCP Version 4 (DHCPv4) packets could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a Relay Reply denial of service (DoS) condition. The vulnerability exists because the affected software performs incomplete input validation of encapsulated option 82 information that it receives in DHCPOFFER messages from DHCPv4 servers. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device, which the device would then forward to a DHCPv4 server. When the affected software processes the option 82 information that is encapsulated in the response from the server, an error could occur. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvg62754.

rockwellautomation cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0173

CVE-2018-0174

8.6 ⚠️ OVERDUE

A vulnerability in the DHCP option 82 encapsulation functionality of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software performs incomplete input validation of option 82 information that it receives in DHCP Version 4 (DHCPv4) packets from DHCP relay agents. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuh91645.

rockwellautomation cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0174

CVE-2018-0175

8.0 ⚠️ OVERDUE

Format String vulnerability in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. Cisco Bug IDs: CSCvd73664.

rockwellautomation cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0175

CVE-2018-0179

5.9 ⚠️ OVERDUE

Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0179

CVE-2018-0180

5.9 ⚠️ OVERDUE

Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-0180

CVE-2018-8298

7.5 ⚠️ OVERDUE

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296.

microsoft
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-8298

CVE-2018-8581

7.4 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka "Microsoft Exchange Server Elevation of Privilege Vulnerability." This affects Microsoft Exchange Server.

microsoft
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-8581

CVE-2019-1652

7.2 ⚠️ OVERDUE

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1652

CVE-2019-1297

8.8 ⚠️ OVERDUE

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.

microsoft
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1297

CVE-2019-16928

9.8 ⚠️ OVERDUE

Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.

debian fedoraproject exim +1
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-16928

CVE-2020-1938

9.8 ⚠️ OVERDUE

When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.

debian blackberry netapp +4
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-1938

CVE-2020-11899

5.4 ⚠️ OVERDUE

The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.

treck dell
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-11899

CVE-2021-41379

5.5 ⚠️ OVERDUE 💀 Ransomware

Windows Installer Elevation of Privilege Vulnerability

microsoft
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-41379

CVE-2022-20699

10.0 ⚠️ OVERDUE

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-20699

CVE-2022-20700

10.0 ⚠️ OVERDUE

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-20700

CVE-2022-20701

10.0 ⚠️ OVERDUE

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-20701

CVE-2022-20703

10.0 ⚠️ OVERDUE

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-20703

CVE-2022-20708

10.0 ⚠️ OVERDUE

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

cisco
Added to KEV
2022-03-03
Remediation Deadline
2022-03-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-20708

CVE-2014-6352

7.8 ⚠️ OVERDUE

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object, as exploited in the wild in October 2014 with a crafted PowerPoint document.

microsoft
Added to KEV
2022-02-25
Remediation Deadline
2022-08-25

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-6352

CVE-2017-0222

8.8 ⚠️ OVERDUE

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0226.

microsoft
Added to KEV
2022-02-25
Remediation Deadline
2022-08-25

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-0222

CVE-2017-8570

7.8 ⚠️ OVERDUE

Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243.

microsoft
Added to KEV
2022-02-25
Remediation Deadline
2022-08-25

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-8570

CVE-2022-24682

6.1 ⚠️ OVERDUE 💀 Ransomware

An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1), as exploited in the wild starting in December 2021. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.

synacor
Added to KEV
2022-02-25
Remediation Deadline
2022-03-11

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-24682

CVE-2022-23131

9.1 ⚠️ OVERDUE

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

zabbix
Added to KEV
2022-02-22
Remediation Deadline
2022-03-08

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-23131

CVE-2022-23134

3.7 ⚠️ OVERDUE

After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.

zabbix fedoraproject debian
Added to KEV
2022-02-22
Remediation Deadline
2022-03-08

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-23134

CVE-2013-3906

7.8 ⚠️ OVERDUE

GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.

microsoft
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-3906

CVE-2014-1761

7.8 ⚠️ OVERDUE

Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.

microsoft
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-1761

CVE-2017-9841

9.8 ⚠️ OVERDUE

Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.

phpunit_project oracle
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-9841

CVE-2018-8174

7.5 ⚠️ OVERDUE 💀 Ransomware

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

microsoft
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-8174

CVE-2018-15982

7.8 ⚠️ OVERDUE 💀 Ransomware

Flash Player versions 31.0.0.153 and earlier, and 31.0.0.108 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.

redhat adobe linux +3
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-15982