CISA Known Exploited Vulnerabilities
1483
Total KEV

Known Exploited Vulnerabilities

Track actively exploited CVEs from the CISA catalog with remediation deadlines

1472
Overdue

Showing 50 of 1472 KEV entries

View official CISA catalog

CVE-2020-0938

7.8 ⚠️ OVERDUE

A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1020.

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-0938

CVE-2020-0968

7.5 ⚠️ OVERDUE

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0970.

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-0968

CVE-2020-1020

8.8 ⚠️ OVERDUE

A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0938.

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-1020

CVE-2020-3161

9.8 ⚠️ OVERDUE

A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.

cisco
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-3161

CVE-2020-6819

8.1 ⚠️ OVERDUE

Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.

mozilla
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-6819

CVE-2020-6820

8.1 ⚠️ OVERDUE

Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.

mozilla
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-6820

CVE-2020-12271

9.8 ⚠️ OVERDUE 💀 Ransomware

A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords)

sophos
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-12271

CVE-2020-11651

9.8 ⚠️ OVERDUE

An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.

canonical debian vmware +2
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-11651

CVE-2020-11652

6.5 ⚠️ OVERDUE

An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.

canonical debian blackberry +3
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-11652

CVE-2020-4427

9.8 ⚠️ OVERDUE

IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process and gain full administrative access to the system. IBM X-Force ID: 180532.

ibm
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-4427

CVE-2020-4428

9.1 ⚠️ OVERDUE

IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, and 2.0.4 could allow a remote authenticated attacker to execute arbitrary commands on the system. IBM X-Force ID: 180533.

ibm
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-4428

CVE-2020-4430

4.3 ⚠️ OVERDUE

IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, and 2.0.4 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a specially-crafted URL request to download arbitrary files from the system. IBM X-Force ID: 180535.

ibm
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-4430

CVE-2020-1054

7.8 ⚠️ OVERDUE

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143.

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-1054

CVE-2020-9859

7.8 ⚠️ OVERDUE

A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.5.1 and iPadOS 13.5.1, macOS Catalina 10.15.5 Supplemental Update, tvOS 13.4.6, watchOS 6.2.6. An application may be able to execute arbitrary code with kernel privileges.

apple
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-9859

CVE-2020-9818

8.8 ⚠️ OVERDUE

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.5 and iPadOS 13.5, iOS 12.4.7, watchOS 6.2.5. Processing a maliciously crafted mail message may lead to unexpected memory modification or application termination.

apple
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-9818

CVE-2020-9819

4.3 ⚠️ OVERDUE

A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.5 and iPadOS 13.5, iOS 12.4.7, watchOS 6.2.5, watchOS 5.3.7. Processing a maliciously crafted mail message may lead to heap corruption.

apple
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-9819

CVE-2020-0986

7.8 ⚠️ OVERDUE

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-0986

CVE-2020-5902

9.8 ⚠️ OVERDUE 💀 Ransomware

In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.

f5
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-5902

CVE-2020-15505

9.8 ⚠️ OVERDUE

A remote code execution vulnerability in MobileIron Core & Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0; and Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors.

mobileiron
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-15505

CVE-2020-8193

6.5 ⚠️ OVERDUE

Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints.

citrix
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-8193

CVE-2020-8195

6.5 ⚠️ OVERDUE

Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users.

citrix
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-8195

CVE-2020-8196

4.3 ⚠️ OVERDUE

Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users.

citrix
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-8196

CVE-2020-10987

9.8 ⚠️ OVERDUE

The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.

tenda
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-10987

CVE-2020-6287

10.0 ⚠️ OVERDUE

SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.50, does not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create an administrative user, and therefore compromising Confidentiality, Integrity and Availability of the system, leading to Missing Authentication Check.

sap
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-6287

CVE-2020-1040

9.0 ⚠️ OVERDUE

A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1032, CVE-2020-1036, CVE-2020-1041, CVE-2020-1042, CVE-2020-1043.

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-1040

CVE-2020-1147

7.8 ⚠️ OVERDUE

A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-1147

CVE-2020-1350

10.0 ⚠️ OVERDUE

A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 20-03 (https://www.cisa.gov/news-events/directives/ed-20-03-mitigate-windows-dns-server-remote-code-execution-vulnerability-july-2020-patch-tuesday) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 20-03. https://nvd.nist.gov/vuln/detail/CVE-2020-1350

CVE-2020-3452

7.5 ⚠️ OVERDUE

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.

cisco
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-3452

CVE-2020-12812

9.8 ⚠️ OVERDUE 💀 Ransomware

An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username.

fortinet
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-12812

CVE-2020-17496

9.8 ⚠️ OVERDUE

vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759.

vbulletin
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-17496

CVE-2019-5591

6.5 ⚠️ OVERDUE

A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.

fortinet
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-5591

CVE-2020-1380

7.8 ⚠️ OVERDUE

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked &quot;safe for initialization&quot; in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-1380

CVE-2020-1464

7.8 ⚠️ OVERDUE

A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded. The update addresses the vulnerability by correcting how Windows validates file signatures.

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-1464

CVE-2020-1472

5.5 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.

canonical debian samba +5
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 20-04 (https://www.cisa.gov/news-events/directives/ed-20-04-mitigate-netlogon-elevation-privilege-vulnerability-august-2020-patch-tuesday) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 20-04. https://nvd.nist.gov/vuln/detail/CVE-2020-1472

CVE-2020-3566

8.6 ⚠️ OVERDUE

A vulnerability in the Distance Vector Multicast Routing Protocol (DVMRP) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust process memory of an affected device. The vulnerability is due to insufficient queue management for Internet Group Management Protocol (IGMP) packets. An attacker could exploit this vulnerability by sending crafted IGMP traffic to an affected device. A successful exploit could allow the attacker to cause memory exhaustion, resulting in instability of other processes. These processes may include, but are not limited to, interior and exterior routing protocols. Cisco will release software updates that address this vulnerability.

cisco
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-3566

CVE-2020-24557

7.8 ⚠️ OVERDUE

A vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected.

trendmicro microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-24557

CVE-2020-25213

10.0 ⚠️ OVERDUE

The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.

filemanagerpro
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-25213

CVE-2020-0878

4.2 ⚠️ OVERDUE 💀 Ransomware

<p>A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft browsers, and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically via an enticement in email or instant message, or by getting them to open an email attachment.</p> <p>The security update addresses the vulnerability by modifying how Microsoft browsers handle objects in memory.</p>

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-0878

CVE-2020-3569

8.6 ⚠️ OVERDUE

Multiple vulnerabilities in the Distance Vector Multicast Routing Protocol (DVMRP) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to either immediately crash the Internet Group Management Protocol (IGMP) process or make it consume available memory and eventually crash. The memory consumption may negatively impact other processes that are running on the device. These vulnerabilities are due to the incorrect handling of IGMP packets. An attacker could exploit these vulnerabilities by sending crafted IGMP traffic to an affected device. A successful exploit could allow the attacker to immediately crash the IGMP process or cause memory exhaustion, resulting in other processes becoming unstable. These processes may include, but are not limited to, interior and exterior routing protocols. Cisco will release software updates that address these vulnerabilities.

cisco
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-3569

CVE-2020-8243

7.2 ⚠️ OVERDUE

A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to upload custom template to perform an arbitrary code execution.

ivanti
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2020-8243

CVE-2020-26919

9.8 ⚠️ OVERDUE

NETGEAR JGS516PE devices before 2.6.0.43 are affected by lack of access control at the function level.

netgear
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-26919

CVE-2020-3992

9.8 ⚠️ OVERDUE 💀 Ransomware

OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.

vmware
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-3992

CVE-2020-14871

10.0 ⚠️ OVERDUE

Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: This CVE is not exploitable for Solaris 11.1 and later releases, and ZFSSA 8.7 and later releases, thus the CVSS Base Score is 0.0. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

oracle
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-14871

CVE-2020-14882

9.8 ⚠️ OVERDUE

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

oracle
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-14882

CVE-2020-14883

7.2 ⚠️ OVERDUE

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

oracle
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-14883

CVE-2020-3580

6.1 ⚠️ OVERDUE 💀 Ransomware

Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section.

cisco
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-3580

CVE-2020-8260

7.2 ⚠️ OVERDUE

A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.

ivanti
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2020-8260

CVE-2020-14750

9.8 ⚠️ OVERDUE

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

oracle
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-14750

CVE-2020-15999

9.6 ⚠️ OVERDUE

Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

freetype debian fedoraproject +3
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-15999

CVE-2020-16009

8.8 ⚠️ OVERDUE

Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

debian cefsharp fedoraproject +3
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-16009