CISA Known Exploited Vulnerabilities
1546
Total KEV

Known Exploited Vulnerabilities

Track actively exploited CVEs from the CISA catalog with remediation deadlines

1530
Overdue

Showing 50 of 1546 KEV entries

View official CISA catalog

CVE-2021-1732

7.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Windows Win32k Elevation of Privilege Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-1732

CVE-2021-26855

9.1 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Microsoft Exchange Server Remote Code Execution Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-26855

CVE-2021-26857

7.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Microsoft Exchange Server Remote Code Execution Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-26857

CVE-2021-26858

7.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Microsoft Exchange Server Remote Code Execution Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-26858

CVE-2021-27065

7.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Microsoft Exchange Server Remote Code Execution Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-27065

CVE-2021-21166

8.8 โš ๏ธ OVERDUE

Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

debian google fedoraproject
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-21166

CVE-2021-26411

8.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Internet Explorer Memory Corruption Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-26411

CVE-2021-27059

7.6 โš ๏ธ OVERDUE

Microsoft Office Remote Code Execution Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-27059

CVE-2021-27085

8.8 โš ๏ธ OVERDUE

Internet Explorer Remote Code Execution Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-27085

CVE-2021-21193

8.8 โš ๏ธ OVERDUE

Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

debian google fedoraproject
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-21193

CVE-2021-22506

7.5 โš ๏ธ OVERDUE

Advance configuration exposing Information Leakage vulnerability in Micro Focus Access Manager product, affects all versions prior to version 5.0. The vulnerability could cause information leakage.

microfocus
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-22506

CVE-2021-22986

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

f5
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-22986

CVE-2021-1782

7.0 โš ๏ธ OVERDUE

A race condition was addressed with improved locking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited..

apple
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-1782

CVE-2021-1870

9.8 โš ๏ธ OVERDUE

A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..

webkitgtk apple fedoraproject
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-1870

CVE-2021-1871

9.8 โš ๏ธ OVERDUE

A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..

debian apple fedoraproject
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-1871

CVE-2021-1879

6.1 โš ๏ธ OVERDUE

This issue was addressed by improved management of object lifetimes. This issue is fixed in iOS 12.5.2, iOS 14.4.2 and iPadOS 14.4.2, watchOS 7.3.3. Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited..

apple
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-1879

CVE-2021-20021

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.

microsoft sonicwall
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-20021

CVE-2021-20022

7.2 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to upload an arbitrary file to the remote host.

microsoft sonicwall
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-20022

CVE-2021-28310

7.8 โš ๏ธ OVERDUE

Win32k Elevation of Privilege Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-28310

CVE-2021-20023

4.9 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to read an arbitrary file on the remote host.

microsoft sonicwall
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-20023

CVE-2021-22893

10.0 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.

ivanti
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22893

CVE-2021-22205

10.0 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.

gitlab
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-22205

CVE-2021-21206

8.8 โš ๏ธ OVERDUE

Use after free in Blink in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

google fedoraproject
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-21206

CVE-2021-21220

8.8 โš ๏ธ OVERDUE

Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

google fedoraproject
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-21220

CVE-2021-21224

8.8 โš ๏ธ OVERDUE

Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

debian google fedoraproject
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-21224

CVE-2021-20090

9.8 โš ๏ธ OVERDUE

A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.

buffalo
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-20090

CVE-2021-1497

9.8 โš ๏ธ OVERDUE

Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

cisco
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-1497

CVE-2021-1498

9.8 โš ๏ธ OVERDUE

Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

cisco
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-1498

CVE-2021-1905

8.4 โš ๏ธ OVERDUE

Possible use after free due to improper handling of memory mapping of multiple processes simultaneously. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

qualcomm
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-1905

CVE-2021-1906

6.2 โš ๏ธ OVERDUE

Improper handling of address deregistration on failure can lead to new GPU address allocation failure. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

qualcomm
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-1906

CVE-2021-31755

9.8 โš ๏ธ OVERDUE

An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.

tenda
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-31755

CVE-2021-28663

8.8 โš ๏ธ OVERDUE

The Arm Mali GPU kernel driver allows privilege escalation or information disclosure because GPU memory operations are mishandled, leading to a use-after-free. This affects Bifrost r0p0 through r28p0 before r29p0, Valhall r19p0 through r28p0 before r29p0, and Midgard r4p0 through r30p0.

arm
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-28663

CVE-2021-28664

8.8 โš ๏ธ OVERDUE

The Arm Mali GPU kernel driver allows privilege escalation or a denial of service (memory corruption) because an unprivileged user can achieve read/write access to read-only pages. This affects Bifrost r0p0 through r29p0 before r30p0, Valhall r19p0 through r29p0 before r30p0, and Midgard r8p0 through r30p0 before r31p0.

arm
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-28664

CVE-2021-31207

6.6 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Microsoft Exchange Server Security Feature Bypass Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-31207

CVE-2021-27562

5.5 โš ๏ธ OVERDUE

In Arm Trusted Firmware M through 1.2, the NS world may trigger a system halt, an overwrite of secure data, or the printing out of secure data when calling secure functions under the NSPE handler mode.

arm
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-27562

CVE-2021-21985

9.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

vmware
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-21985

CVE-2021-22894

8.8 โš ๏ธ OVERDUE

A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room.

ivanti
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22894

CVE-2021-22899

8.8 โš ๏ธ OVERDUE

A command injection vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to perform remote code execution via Windows Resource Profiles Feature

ivanti
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22899

CVE-2021-22900

7.2 โš ๏ธ OVERDUE

A vulnerability allowed multiple unrestricted uploads in Pulse Connect Secure before 9.1R11.4 that could lead to an authenticated administrator to perform a file write via a maliciously crafted archive upload in the administrator web interface.

ivanti pulsesecure
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22900

CVE-2021-1675

7.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Windows Print Spooler Remote Code Execution Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-1675

CVE-2021-31199

5.2 โš ๏ธ OVERDUE

Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-31199

CVE-2021-31201

5.2 โš ๏ธ OVERDUE

Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-31201

CVE-2021-31955

5.5 โš ๏ธ OVERDUE

Windows Kernel Information Disclosure Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-31955

CVE-2021-31956

7.8 โš ๏ธ OVERDUE

Windows NTFS Elevation of Privilege Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-31956

CVE-2021-33739

8.4 โš ๏ธ OVERDUE

Microsoft DWM Core Library Elevation of Privilege Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-33739

CVE-2021-33742

7.5 โš ๏ธ OVERDUE

Windows MSHTML Platform Remote Code Execution Vulnerability

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-33742

CVE-2021-30551

8.8 โš ๏ธ OVERDUE

Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

google fedoraproject
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-30551

CVE-2021-30554

8.8 โš ๏ธ OVERDUE

Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

google fedoraproject
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-30554

CVE-2021-34527

8.8 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been released. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability.</p> <p>In addition to installing the updates, in order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined (<strong>Note</strong>: These registry keys do not exist by default, and therefore are already at the secure setting.), also that your Group Policy setting are correct (see FAQ):</p> <ul> <li>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint</li> <li>NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)</li> <li>UpdatePromptSettings = 0 (DWORD) or not defined (default setting)</li> </ul> <p><strong>Having NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.</strong></p> <p>UPDATE July 6, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability. See also <a href="https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-183b129578a7">KB5005010: Restricting installation of new printer drivers after applying the July 6, 2021 updates</a>.</p> <p>Note that the security updates released on and after July 6, 2021 contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as โ€œPrintNightmareโ€, documented in CVE-2021-34527.</p>

microsoft
Added to KEV
2021-11-03
Remediation Deadline
2022-05-03

Notes: Reference CISA's ED 21-04 (https://www.cisa.gov/news-events/directives/ed-21-04-mitigate-windows-print-spooler-service-vulnerability) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-04. https://nvd.nist.gov/vuln/detail/CVE-2021-34527

CVE-2021-30116

10.0 โš ๏ธ OVERDUE ๐Ÿ’€ Ransomware

Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021. By default Kaseya VSA on premise offers a download page where the clients for the installation can be downloaded. The default URL for this page is https://x.x.x.x/dl.asp When an attacker download a client for Windows and installs it, the file KaseyaD.ini is generated (C:\Program Files (x86)\Kaseya\XXXXXXXXXX\KaseyaD.ini) which contains an Agent_Guid and AgentPassword This Agent_Guid and AgentPassword can be used to log in on dl.asp (https://x.x.x.x/dl.asp?un=840997037507813&pw=113cc622839a4077a84837485ced6b93e440bf66d44057713cb2f95e503a06d9) This request authenticates the client and returns a sessionId cookie that can be used in subsequent attacks to bypass authentication. Security issues discovered --- * Unauthenticated download page leaks credentials * Credentials of agent software can be used to obtain a sessionId (cookie) that can be used for services not intended for use by agents * dl.asp accepts credentials via a GET request * Access to KaseyaD.ini gives an attacker access to sufficient information to penetrate the Kaseya installation and its clients. Impact --- Via the page /dl.asp enough information can be obtained to give an attacker a sessionId that can be used to execute further (semi-authenticated) attacks against the system.

kaseya
Added to KEV
2021-11-03
Remediation Deadline
2021-11-17

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-30116