Exploited Vulnerabilities
Catalog 2024
H
2025(48)
2024(144)
2023(152)
2022(126)
2021(203)
2020(142)
Linux | Kernel
Linux Kernel Out-of-Bounds Read
Vulnerability: Linux
Kernel contains an out-of-bounds read vulnerability in the
USB-audio driver that allows a local, privileged attacker to
obtain potentially sensitive information.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions,
follow applicable BOD 22-01 guidance for cloud services, or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-04-09
-
Due Date: 2025-04-30
Linux | Kernel
Linux Kernel Out-of-Bounds Access
Vulnerability: Linux
Kernel contains an out-of-bounds access vulnerability in the
USB-audio driver that allows an attacker with physical access to
the system to use a malicious USB device to potentially
manipulate system memory, escalate privileges, or execute
arbitrary code.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions,
follow applicable BOD 22-01 guidance for cloud services, or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-04-09
-
Due Date: 2025-04-30
Cisco | Smart Licensing
Utility
Cisco Smart Licensing Utility
Static Credential Vulnerability: Cisco
Smart Licensing Utility contains a static credential
vulnerability that allows an unauthenticated, remote attacker to
log in to an affected system and gain administrative credentials.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions,
follow applicable BOD 22-01 guidance for cloud services, or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-03-31
-
Due Date: 2025-04-21
NAKIVO | Backup and
Replication
NAKIVO Backup and Replication
Absolute Path Traversal Vulnerability: NAKIVO
Backup and Replication contains an absolute path traversal
vulnerability that enables an attacker to read arbitrary files.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions,
follow applicable BOD 22-01 guidance for cloud services, or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-03-19
-
Due Date: 2025-04-09
Ivanti | Endpoint Manager
(EPM)
Ivanti Endpoint Manager (EPM)
Absolute Path Traversal Vulnerability: Ivanti
Endpoint Manager (EPM) contains an absolute path traversal
vulnerability that allows a remote unauthenticated attacker to
leak sensitive information.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions,
follow applicable BOD 22-01 guidance for cloud services, or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-03-10
-
Due Date: 2025-03-31
Ivanti | Endpoint Manager
(EPM)
Ivanti Endpoint Manager (EPM)
Absolute Path Traversal Vulnerability: Ivanti
Endpoint Manager (EPM) contains an absolute path traversal
vulnerability that allows a remote unauthenticated attacker to
leak sensitive information.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions,
follow applicable BOD 22-01 guidance for cloud services, or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-03-10
-
Due Date: 2025-03-31
Ivanti | Endpoint Manager
(EPM)
Ivanti Endpoint Manager (EPM)
Absolute Path Traversal Vulnerability: Ivanti
Endpoint Manager (EPM) contains an absolute path traversal
vulnerability that allows a remote unauthenticated attacker to
leak sensitive information.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions,
follow applicable BOD 22-01 guidance for cloud services, or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-03-10
-
Due Date: 2025-03-31
Advantive | VeraCore
Advantive VeraCore Unrestricted
File Upload Vulnerability: Advantive
VeraCore contains an unrestricted file upload vulnerability that
allows a remote unauthenticated attacker to upload files to
unintended folders via upload.apsx.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions,
follow applicable BOD 22-01 guidance for cloud services, or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-03-10
-
Due Date: 2025-03-31
Linux | Kernel
Linux Kernel Use of Uninitialized
Resource Vulnerability: The
Linux kernel contains a use of uninitialized resource
vulnerability that allows an attacker to leak kernel memory via
a specially crafted HID report.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions,
follow applicable BOD 22-01 guidance for cloud services, or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-03-04
-
Due Date: 2025-03-25
Progress | WhatsUp Gold
Progress WhatsUp Gold Path
Traversal Vulnerability: Progress
WhatsUp Gold contains a path traversal vulnerability that allows
an unauthenticated attacker to achieve remote code execution.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions,
follow applicable BOD 22-01 guidance for cloud services, or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-03-03
-
Due Date: 2025-03-24
Microsoft | Partner Center
Microsoft Partner Center Improper
Access Control Vulnerability: Microsoft
Partner Center contains an improper access control vulnerability
that allows an attacker to escalate privileges.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions,
follow applicable BOD 22-01 guidance for cloud services, or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-02-25
-
Due Date: 2025-03-18
Oracle | Agile Product
Lifecycle Management (PLM)
Oracle Agile Product Lifecycle
Management (PLM) Deserialization Vulnerability: Oracle
Agile Product Lifecycle Management (PLM) contains a
deserialization vulnerability that allows a low-privileged
attacker with network access via HTTP to compromise the system.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-02-24
-
Due Date: 2025-03-17
SonicWall | SonicOS
SonicWall SonicOS SSLVPN Improper
Authentication Vulnerability: SonicWall
SonicOS contains an improper authentication vulnerability in the
SSLVPN authentication mechanism that allows a remote attacker to
bypass authentication.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-02-18
-
Due Date: 2025-03-11
SimpleHelp | SimpleHelp
SimpleHelp Path Traversal
Vulnerability: SimpleHelp
remote support software contains multiple path traversal
vulnerabilities that allow unauthenticated remote attackers to
download arbitrary files from the SimpleHelp host via crafted
HTTP requests. These files may include server configuration
files and hashed user passwords.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-02-13
-
Due Date: 2025-03-06
Mitel | SIP Phones
Mitel SIP Phones Argument
Injection Vulnerability: Mitel
6800 Series, 6900 Series, and 6900w Series SIP Phones, including
the 6970 Conference Unit, contain an argument injection
vulnerability due to insufficient parameter sanitization during
the boot process. Successful exploitation may allow an attacker
to execute arbitrary commands within the context of the system.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-02-12
-
Due Date: 2025-03-05
Zyxel | DSL CPE Devices
Zyxel DSL CPE OS Command Injection
Vulnerability: Multiple
Zyxel DSL CPE devices contain a post-authentication command
injection vulnerability in the management commands that could
allow an authenticated attacker to execute OS commands via
Telnet.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: The impacted product could be end-of-life
(EoL) and/or end-of-service (EoS). Users should discontinue
product utilization if a current mitigation is unavailable.
-
Date Added: 2025-02-11
-
Due Date: 2025-03-04
Zyxel | DSL CPE Devices
Zyxel DSL CPE OS Command Injection
Vulnerability: Multiple
Zyxel DSL CPE devices contain a post-authentication command
injection vulnerability in the CGI program that could allow an
authenticated attacker to execute OS commands via a crafted HTTP
request.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: The impacted product could be end-of-life
(EoL) and/or end-of-service (EoS). Users should discontinue
product utilization if a current mitigation is unavailable.
-
Date Added: 2025-02-11
-
Due Date: 2025-03-04
Microsoft | Office Outlook
Microsoft Outlook Improper Input
Validation Vulnerability: Microsoft
Outlook contains an improper input validation vulnerability that
allows for remote code execution. Successful exploitation of
this vulnerability would allow an attacker to bypass the Office
Protected View and open in editing mode rather than protected
mode.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-02-06
-
Due Date: 2025-02-27
Linux | Kernel
Linux Kernel Out-of-Bounds Write
Vulnerability: Linux
kernel contains an out-of-bounds write vulnerability in the
uvc_parse_streaming component of the USB Video Class (UVC)
driver that could allow for physical escalation of privilege.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-02-05
-
Due Date: 2025-02-26
Microsoft | .NET Framework
Microsoft .NET Framework
Information Disclosure Vulnerability: Microsoft
.NET Framework contains an information disclosure vulnerability
that exposes the ObjRef URI to an attacker, ultimately enabling
remote code execution.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-02-04
-
Due Date: 2025-02-25
Apache | OFBiz
Apache OFBiz Forced Browsing
Vulnerability: Apache
OFBiz contains a forced browsing vulnerability that allows a
remote attacker to obtain unauthorized access.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-02-04
-
Due Date: 2025-02-25
Aviatrix | Controllers
Aviatrix Controllers OS Command
Injection Vulnerability: Aviatrix
Controllers contain an OS command injection vulnerability that
could allow an unauthenticated attacker to execute arbitrary
code. Shell metacharacters can be sent to /v1/api in cloud_type
for list_flightpath_destination_instances, or src_cloud_type for
flightpath_connection_test.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-01-16
-
Due Date: 2025-02-06
Fortinet | FortiOS and
FortiProxy
Fortinet FortiOS and FortiProxy
Authentication Bypass Vulnerability: Fortinet
FortiOS and FortiProxy contain an authentication bypass
vulnerability that may allow an unauthenticated, remote attacker
to gain super-admin privileges via crafted requests to Node.js
websocket module.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-01-14
-
Due Date: 2025-01-21
BeyondTrust | Privileged
Remote Access (PRA) and Remote Support (RS)
BeyondTrust Privileged Remote
Access (PRA) and Remote Support (RS) OS Command Injection
Vulnerability: BeyondTrust
Privileged Remote Access (PRA) and Remote Support (RS) contain
an OS command injection vulnerability that can be exploited by
an attacker with existing administrative privileges to upload a
malicious file. Successful exploitation of this vulnerability
can allow a remote attacker to execute underlying operating
system commands within the context of the site user.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-01-13
-
Due Date: 2025-02-03
Mitel | MiCollab
Mitel MiCollab Path Traversal
Vulnerability: Mitel
MiCollab contains a path traversal vulnerability that could
allow an authenticated attacker with administrative privileges
to read local files within the system due to insufficient input
sanitization. This vulnerability can be chained with
CVE-2024-41713, which allows an unauthenticated, remote attacker
to read arbitrary files on the server.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-01-07
-
Due Date: 2025-01-28
Mitel | MiCollab
Mitel MiCollab Path Traversal
Vulnerability: Mitel
MiCollab contains a path traversal vulnerability that could
allow an attacker to gain unauthorized and unauthenticated
access. This vulnerability can be chained with CVE-2024-55550,
which allows an unauthenticated, remote attacker to read
arbitrary files on the server.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2025-01-07
-
Due Date: 2025-01-28
Palo Alto Networks | PAN-OS
Palo Alto Networks PAN-OS
Malicious DNS Packet Vulnerability: Palo
Alto Networks PAN-OS contains a vulnerability in parsing and
logging malicious DNS packets in the DNS Security feature that,
when exploited, allows an unauthenticated attacker to remotely
reboot the firewall. Repeated attempts to trigger this condition
will cause the firewall to enter maintenance mode.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-12-30
-
Due Date: 2025-01-20
BeyondTrust | Privileged
Remote Access (PRA) and Remote Support (RS)
BeyondTrust Privileged Remote
Access (PRA) and Remote Support (RS) Command Injection
Vulnerability : BeyondTrust
Privileged Remote Access (PRA) and Remote Support (RS) contain a
command injection vulnerability, which can allow an
unauthenticated attacker to inject commands that are run as a
site user.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-12-19
-
Due Date: 2024-12-27
Cleo | Multiple Products
Cleo Multiple Products
Unauthenticated File Upload Vulnerability: Cleo
Harmony, VLTrader, and LexiCom, which are managed file transfer
products, contain an unrestricted file upload vulnerability that
could allow an unauthenticated user to import and execute
arbitrary bash or PowerShell commands on the host system by
leveraging the default settings of the Autorun directory.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-12-17
-
Due Date: 2025-01-07
Microsoft | Windows
Microsoft Windows Kernel-Mode
Driver Untrusted Pointer Dereference Vulnerability : Microsoft
Windows Kernel-Mode Driver contains an untrusted pointer
dereference vulnerability that allows a local attacker to
escalate privileges.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-12-16
-
Due Date: 2025-01-06
Adobe | ColdFusion
Adobe ColdFusion Improper Access
Control Vulnerability: Adobe
ColdFusion contains an improper access control vulnerability
that could allow an attacker to access or modify restricted
files via an internet-exposed admin panel.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-12-16
-
Due Date: 2025-01-06
Cleo | Multiple Products
Cleo Multiple Products
Unrestricted File Upload Vulnerability: Cleo
Harmony, VLTrader, and LexiCom, which are managed file transfer
products, contain an unrestricted file upload and download
vulnerability that can lead to remote code execution with
elevated privileges.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-12-13
-
Due Date: 2025-01-03
Microsoft | Windows
Microsoft Windows Common Log File
System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability: Microsoft
Windows Common Log File System (CLFS) driver contains a
heap-based buffer overflow vulnerability that allows a local
attacker to escalate privileges.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-12-10
-
Due Date: 2024-12-31
CyberPersons | CyberPanel
CyberPanel Incorrect Default
Permissions Vulnerability: CyberPanel
contains an incorrect default permissions vulnerability that
allows for authentication bypass and the execution of arbitrary
commands using shell metacharacters in the statusfile property.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-12-04
-
Due Date: 2024-12-25
Zyxel | Multiple Firewalls
Zyxel Multiple Firewalls Path
Traversal Vulnerability: Multiple
Zyxel firewalls contain a path traversal vulnerability in the
web management interface that could allow an attacker to
download or upload files via a crafted URL.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-12-03
-
Due Date: 2024-12-24
ProjectSend | ProjectSend
ProjectSend Improper
Authentication Vulnerability: ProjectSend
contains an improper authentication vulnerability that allows a
remote, unauthenticated attacker to enable unauthorized
modification of the application's configuration via crafted HTTP
requests to options.php. Successful exploitation allows
attackers to create accounts, upload webshells, and embed
malicious JavaScript.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-12-03
-
Due Date: 2024-12-24
Oracle | Agile Product
Lifecycle Management (PLM)
Oracle Agile Product Lifecycle
Management (PLM) Incorrect Authorization Vulnerability: Oracle
Agile Product Lifecycle Management (PLM) contains an incorrect
authorization vulnerability in the Process Extension component
of the Software Development Kit. Successful exploitation of this
vulnerability may result in unauthenticated file disclosure.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-21
-
Due Date: 2024-12-12
Apple | Multiple Products
Apple Multiple Products Cross-Site
Scripting (XSS) Vulnerability: Apple
iOS, macOS, and other Apple products contain an unspecified
vulnerability when processing maliciously crafted web content
that may lead to a cross-site scripting (XSS) attack.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-21
-
Due Date: 2024-12-12
Apple | Multiple Products
Apple Multiple Products Code
Execution Vulnerability: Apple
iOS, macOS, and other Apple products contain an unspecified
vulnerability when processing maliciously crafted web content
that may lead to arbitrary code execution.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-21
-
Due Date: 2024-12-12
VMware | vCenter Server
VMware vCenter Server Privilege
Escalation Vulnerability: VMware
vCenter contains an improper check for dropped privileges
vulnerability. This vulnerability could allow an attacker with
network access to the vCenter Server to escalate privileges to
root by sending a specially crafted packet.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-20
-
Due Date: 2024-12-11
VMware | vCenter Server
VMware vCenter Server Heap-Based
Buffer Overflow Vulnerability: VMware
vCenter Server contains a heap-based buffer overflow
vulnerability in the implementation of the DCERPC protocol. This
vulnerability could allow an attacker with network access to the
vCenter Server to execute remote code by sending a specially
crafted packet.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-20
-
Due Date: 2024-12-11
Palo Alto Networks | PAN-OS
Palo Alto Networks PAN-OS
Management Interface OS Command Injection Vulnerability: Palo
Alto Networks PAN-OS contains an OS command injection
vulnerability that allows for privilege escalation through the
web-based management interface for several PAN products,
including firewalls and VPN concentrators.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable. Additionally, the management interfaces for
affected devices should not be exposed to untrusted
networks, including the internet.
-
Date Added: 2024-11-18
-
Due Date: 2024-12-09
Palo Alto Networks | PAN-OS
Palo Alto Networks PAN-OS
Management Interface Authentication Bypass Vulnerability: Palo
Alto Networks PAN-OS contains an authentication bypass
vulnerability in the web-based management interface for several
PAN-OS products, including firewalls and VPN concentrators.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable. Additionally, management interface for affected
devices should not be exposed to untrusted networks,
including the internet.
-
Date Added: 2024-11-18
-
Due Date: 2024-12-09
Progress | Kemp LoadMaster
Progress Kemp LoadMaster OS
Command Injection Vulnerability: Progress
Kemp LoadMaster contains an OS command injection vulnerability
that allows an unauthenticated, remote attacker to access the
system through the LoadMaster management interface, enabling
arbitrary system command execution.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-18
-
Due Date: 2024-12-09
Palo Alto Networks |
Expedition
Palo Alto Networks Expedition SQL
Injection Vulnerability: Palo
Alto Networks Expedition contains a SQL injection vulnerability
that allows an unauthenticated attacker to reveal Expedition
database contents, such as password hashes, usernames, device
configurations, and device API keys. With this, attackers can
also create and read arbitrary files on the Expedition system.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-14
-
Due Date: 2024-12-05
Palo Alto Networks |
Expedition
Palo Alto Networks Expedition OS
Command Injection Vulnerability: Palo
Alto Networks Expedition contains an OS command injection
vulnerability that allows an unauthenticated attacker to run
arbitrary OS commands as root in Expedition, resulting in
disclosure of usernames, cleartext passwords, device
configurations, and device API keys of PAN-OS firewalls.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-14
-
Due Date: 2024-12-05
Microsoft | Windows
Microsoft Windows NTLMv2 Hash
Disclosure Spoofing Vulnerability: Microsoft
Windows contains an NTLMv2 hash spoofing vulnerability that
could result in disclosing a user's NTLMv2 hash to an attacker
via a file open operation. The attacker could then leverage this
hash to impersonate that user.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-12
-
Due Date: 2024-12-03
Microsoft | Windows
Microsoft Windows Task Scheduler
Privilege Escalation Vulnerability: Microsoft
Windows Task Scheduler contains a privilege escalation
vulnerability that can allow an attacker-provided, local
application to escalate privileges outside of its AppContainer,
and access privileged RPC functions.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-12
-
Due Date: 2024-12-03
CyberPersons | CyberPanel
CyberPanel Incorrect Default
Permissions Vulnerability: CyberPanel
contains an incorrect default permissions vulnerability that
allows a remote, unauthenticated attacker to execute commands as
root.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-07
-
Due Date: 2024-11-28
Android | Framework
Android Framework Privilege
Escalation Vulnerability: Android
Framework contains an unspecified vulnerability that allows for
privilege escalation.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-07
-
Due Date: 2024-11-28
Palo Alto Networks |
Expedition
Palo Alto Networks Expedition
Missing Authentication Vulnerability: Palo
Alto Networks Expedition contains a missing authentication
vulnerability that allows an attacker with network access to
takeover an Expedition admin account and potentially access
configuration secrets, credentials, and other data.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-07
-
Due Date: 2024-11-28
PTZOptics | PT30X-SDI/NDI
Cameras
PTZOptics PT30X-SDI/NDI Cameras
Authentication Bypass Vulnerability: PTZOptics
PT30X-SDI/NDI cameras contain an insecure direct object
reference (IDOR) vulnerability that allows a remote, attacker to
bypass authentication for the /cgi-bin/param.cgi CGI script. If
combined with CVE-2024-8957, this can lead to remote code
execution as root.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-04
-
Due Date: 2024-11-25
PTZOptics | PT30X-SDI/NDI
Cameras
PTZOptics PT30X-SDI/NDI Cameras OS
Command Injection Vulnerability: PTZOptics
PT30X-SDI/NDI cameras contain an OS command injection
vulnerability that allows a remote, authenticated attacker to
escalate privileges to root via a crafted payload with the
ntp_addr parameter of the /cgi-bin/param.cgi CGI script.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-11-04
-
Due Date: 2024-11-25
Roundcube | Webmail
RoundCube Webmail Cross-Site
Scripting (XSS) Vulnerability: RoundCube
Webmail contains a cross-site scripting (XSS) vulnerability in
the handling of SVG animate attributes that allows a remote
attacker to run malicious JavaScript code.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-24
-
Due Date: 2024-11-14
Cisco | Adaptive Security
Appliance (ASA) and Firepower Threat Defense (FTD)
Cisco ASA and FTD
Denial-of-Service Vulnerability: Cisco
Adaptive Security Appliance (ASA) and Firepower Threat Defense
(FTD) contain a missing release of resource after effective
lifetime vulnerability that could allow an unauthenticated,
remote attacker to cause a denial-of-service (DoS) of the RAVPN
service.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-24
-
Due Date: 2024-11-14
Fortinet | FortiManager
Fortinet FortiManager Missing
Authentication Vulnerability: Fortinet
FortiManager contains a missing authentication vulnerability in
the fgfmd daemon that allows a remote, unauthenticated attacker
to execute arbitrary code or commands via specially crafted
requests.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-23
-
Due Date: 2024-11-13
Microsoft | SharePoint
Microsoft SharePoint
Deserialization Vulnerability: Microsoft
SharePoint contains a deserialization vulnerability that allows
for remote code execution.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-22
-
Due Date: 2024-11-12
ScienceLogic | SL1
ScienceLogic SL1 Unspecified
Vulnerability: ScienceLogic
SL1 (formerly EM7) is affected by an unspecified vulnerability
involving an unspecified third-party component.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-21
-
Due Date: 2024-11-11
Veeam | Backup & Replication
Veeam Backup and Replication
Deserialization Vulnerability: Veeam
Backup and Replication contains a deserialization vulnerability
allowing an unauthenticated user to perform remote code
execution.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-17
-
Due Date: 2024-11-07
SolarWinds | Web Help Desk
SolarWinds Web Help Desk Hardcoded
Credential Vulnerability: SolarWinds
Web Help Desk contains a hardcoded credential vulnerability that
could allow a remote, unauthenticated user to access internal
functionality and modify data.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-15
-
Due Date: 2024-11-05
Mozilla | Firefox
Mozilla Firefox Use-After-Free
Vulnerability: Mozilla
Firefox and Firefox ESR contain a use-after-free vulnerability
in Animation timelines that allows for code execution in the
content process.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-15
-
Due Date: 2024-11-05
Microsoft | Windows
Microsoft Windows Kernel TOCTOU
Race Condition Vulnerability: Microsoft
Windows Kernel contains a time-of-check to time-of-use (TOCTOU)
race condition vulnerability that could allow for privilege
escalation.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-15
-
Due Date: 2024-11-05
Ivanti | Cloud Services
Appliance (CSA)
Ivanti Cloud Services Appliance
(CSA) OS Command Injection Vulnerability: Ivanti
Cloud Services Appliance (CSA) contains an OS command injection
vulnerability in the administrative console which can allow an
authenticated attacker with application admin privileges to pass
commands to the underlying OS.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: As Ivanti CSA 4.6.x has reached End-of-Life
status, users are urged to remove CSA 4.6.x from service or
upgrade to the 5.0.x line, or later, of supported solution.
-
Date Added: 2024-10-09
-
Due Date: 2024-10-30
Ivanti | Cloud Services
Appliance (CSA)
Ivanti Cloud Services Appliance
(CSA) SQL Injection Vulnerability: Ivanti
Cloud Services Appliance (CSA) contains a SQL injection
vulnerability in the admin web console in versions prior to
5.0.2, which can allow a remote attacker authenticated as
administrator to run arbitrary SQL statements.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: As Ivanti CSA 4.6.x has reached End-of-Life
status, users are urged to remove CSA 4.6.x from service or
upgrade to the 5.0.x line, or later, of supported solution.
-
Date Added: 2024-10-09
-
Due Date: 2024-10-30
Fortinet | Multiple Products
Fortinet Multiple Products Format
String Vulnerability: Fortinet
FortiOS, FortiPAM, FortiProxy, and FortiWeb contain a format
string vulnerability that allows a remote, unauthenticated
attacker to execute arbitrary code or commands via specially
crafted requests.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-09
-
Due Date: 2024-10-30
Microsoft | Windows
Microsoft Windows MSHTML Platform
Spoofing Vulnerability: Microsoft
Windows MSHTML Platform contains an unspecified spoofing
vulnerability which can lead to a loss of confidentiality.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-08
-
Due Date: 2024-10-29
Microsoft | Windows
Microsoft Windows Management
Console Remote Code Execution Vulnerability: Microsoft
Windows Management Console contains unspecified vulnerability
that allows for remote code execution.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-08
-
Due Date: 2024-10-29
Qualcomm | Multiple Chipsets
Qualcomm Multiple Chipsets
Use-After-Free Vulnerability: Multiple
Qualcomm chipsets contain a use-after-free vulnerability due to
memory corruption in DSP Services while maintaining memory maps
of HLOS memory.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply remediations or mitigations per vendor
instructions or discontinue use of the product if
remediation or mitigations are unavailable.
-
Date Added: 2024-10-08
-
Due Date: 2024-10-29
Synacor | Zimbra Collaboration
Suite (ZCS)
Synacor Zimbra Collaboration Suite
(ZCS) Command Execution Vulnerability: Synacor
Zimbra Collaboration Suite (ZCS) contains an unspecified
vulnerability in the postjournal service that may allow an
unauthenticated user to execute commands.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-03
-
Due Date: 2024-10-24
Ivanti | Endpoint Manager
(EPM)
Ivanti Endpoint Manager (EPM) SQL
Injection Vulnerability: Ivanti
Endpoint Manager (EPM) contains a SQL injection vulnerability in
Core server that allows an unauthenticated attacker within the
same network to execute arbitrary code.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-10-02
-
Due Date: 2024-10-23
Ivanti | Virtual Traffic
Manager
Ivanti Virtual Traffic Manager
Authentication Bypass Vulnerability: Ivanti
Virtual Traffic Manager contains an authentication bypass
vulnerability that allows a remote, unauthenticated attacker to
create a chosen administrator account.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-09-24
-
Due Date: 2024-10-15
Ivanti | Cloud Services
Appliance (CSA)
Ivanti Cloud Services Appliance
(CSA) Path Traversal Vulnerability: Ivanti
Cloud Services Appliance (CSA) contains a path traversal
vulnerability that could allow a remote, unauthenticated
attacker to access restricted functionality. If CVE-2024-8963 is
used in conjunction with CVE-2024-8190, an attacker could bypass
admin authentication and execute arbitrary commands on the
appliance.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: As Ivanti CSA has reached End-of-Life status,
users are urged to remove CSA 4.6.x from service or upgrade
to the 5.0.x line of supported solutions, as future
vulnerabilities on the 4.6.x version of CSA are unlikely to
receive security updates.
-
Date Added: 2024-09-19
-
Due Date: 2024-10-10
Apache | HugeGraph-Server
Apache HugeGraph-Server Improper
Access Control Vulnerability: Apache
HugeGraph-Server contains an improper access control
vulnerability that could allow a remote attacker to execute
arbitrary code.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-09-18
-
Due Date: 2024-10-09
Progress | WhatsUp Gold
Progress WhatsUp Gold SQL
Injection Vulnerability: Progress
WhatsUp Gold contains a SQL injection vulnerability that allows
an unauthenticated attacker to retrieve the user's encrypted
password if the application is configured with only a single
user.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-09-16
-
Due Date: 2024-10-07
Microsoft | Windows
Microsoft Windows MSHTML Platform
Spoofing Vulnerability: Microsoft
Windows MSHTML Platform contains a user interface (UI)
misrepresentation of critical information vulnerability that
allows an attacker to spoof a web page. This vulnerability was
exploited in conjunction with CVE-2024-38112.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-09-16
-
Due Date: 2024-10-07
Ivanti | Cloud Services
Appliance
Ivanti Cloud Services Appliance OS
Command Injection Vulnerability: Ivanti
Cloud Services Appliance (CSA) contains an OS command injection
vulnerability in the administrative console which can allow an
authenticated attacker with application admin privileges to pass
commands to the underlying OS.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: As Ivanti CSA has reached End-of-Life status,
users are urged to remove CSA 4.6.x from service or upgrade
to the 5.0.x line of supported solutions, as future
vulnerabilities on the 4.6.x version of CSA are unlikely to
receive future security updates.
-
Date Added: 2024-09-13
-
Due Date: 2024-10-04
Microsoft | Windows
Microsoft Windows Mark of the Web
(MOTW) Protection Mechanism Failure Vulnerability: Microsoft
Windows Mark of the Web (MOTW) contains a protection mechanism
failure vulnerability that allows an attacker to bypass
MOTW-based defenses. This can result in a limited loss of
integrity and availability of security features such as
Protected View in Microsoft Office, which rely on MOTW tagging.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-09-10
-
Due Date: 2024-10-01
Microsoft | Windows
Microsoft Windows Installer
Improper Privilege Management Vulnerability: Microsoft
Windows Installer contains an improper privilege management
vulnerability that could allow an attacker to gain SYSTEM
privileges.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-09-10
-
Due Date: 2024-10-01
Microsoft | Publisher
Microsoft Publisher Protection
Mechanism Failure Vulnerability: Microsoft
Publisher contains a protection mechanism failure vulnerability
that allows attacker to bypass Office macro policies used to
block untrusted or malicious files.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-09-10
-
Due Date: 2024-10-01
SonicWall | SonicOS
SonicWall SonicOS Improper Access
Control Vulnerability: SonicWall
SonicOS contains an improper access control vulnerability that
could lead to unauthorized resource access and, under certain
conditions, may cause the firewall to crash.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-09-09
-
Due Date: 2024-09-30
Kingsoft | WPS Office
Kingsoft WPS Office Path Traversal
Vulnerability: Kingsoft
WPS Office contains a path traversal vulnerability in
promecefpluginhost.exe on Windows that allows an attacker to
load an arbitrary Windows library.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-09-03
-
Due Date: 2024-09-24
Google | Chromium V8
Google Chromium V8 Inappropriate
Implementation Vulnerability: Google
Chromium V8 contains an inappropriate implementation
vulnerability that allows a remote attacker to potentially
exploit heap corruption via a crafted HTML page. This
vulnerability could affect multiple web browsers that utilize
Chromium, including, but not limited to, Google Chrome,
Microsoft Edge, and Opera.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-28
-
Due Date: 2024-09-18
Apache | OFBiz
Apache OFBiz Incorrect
Authorization Vulnerability: Apache
OFBiz contains an incorrect authorization vulnerability that
could allow remote code execution via a Groovy payload in the
context of the OFBiz user process by an unauthenticated
attacker.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-27
-
Due Date: 2024-09-17
Google | Chromium V8
Google Chromium V8 Type Confusion
Vulnerability: Google
Chromium V8 contains a type confusion vulnerability that allows
a remote attacker to exploit heap corruption via a crafted HTML
page. This vulnerability could affect multiple web browsers that
utilize Chromium, including, but not limited to, Google Chrome,
Microsoft Edge, and Opera.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-26
-
Due Date: 2024-09-16
Versa | Director
Versa Director Dangerous File Type
Upload Vulnerability: The
Versa Director GUI contains an unrestricted upload of file with
dangerous type vulnerability that allows administrators with
Provider-Data-Center-Admin or Provider-Data-Center-System-Admin
privileges to customize the user interface. The “Change Favicon”
(Favorite Icon) enables the upload of a .png file, which can be
exploited to upload a malicious file with a .png extension
disguised as an image.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-23
-
Due Date: 2024-09-13
Jenkins | Jenkins Command Line
Interface (CLI)
Jenkins Command Line Interface
(CLI) Path Traversal Vulnerability: Jenkins
Command Line Interface (CLI) contains a path traversal
vulnerability that allows attackers limited read access to
certain files, which can lead to code execution.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-19
-
Due Date: 2024-09-09
SolarWinds | Web Help Desk
SolarWinds Web Help Desk
Deserialization of Untrusted Data Vulnerability: SolarWinds
Web Help Desk contains a deserialization of untrusted data
vulnerability that could allow for remote code execution.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-15
-
Due Date: 2024-09-05
Microsoft | Windows
Microsoft Windows Power Dependency
Coordinator Privilege Escalation Vulnerability: Microsoft
Windows Power Dependency Coordinator contains an unspecified
vulnerability that allows for privilege escalation, enabling a
local attacker to obtain SYSTEM privileges.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-13
-
Due Date: 2024-09-03
Microsoft | Windows
Microsoft Windows Kernel Privilege
Escalation Vulnerability: Microsoft
Windows Kernel contains an unspecified vulnerability that allows
for privilege escalation, enabling a local attacker to gain
SYSTEM privileges. Successful exploitation of this vulnerability
requires an attacker to win a race condition.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-13
-
Due Date: 2024-09-03
Microsoft | Windows
Microsoft Windows Ancillary
Function Driver for WinSock Privilege Escalation Vulnerability: Microsoft
Windows Ancillary Function Driver for WinSock contains an
unspecified vulnerability that allows for privilege escalation,
enabling a local attacker to gain SYSTEM privileges.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-13
-
Due Date: 2024-09-03
Microsoft | Windows
Microsoft Windows SmartScreen
Security Feature Bypass Vulnerability: Microsoft
Windows SmartScreen contains a security feature bypass
vulnerability that allows an attacker to bypass the SmartScreen
user experience via a malicious file.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-13
-
Due Date: 2024-09-03
Microsoft | Windows
Microsoft Windows Scripting Engine
Memory Corruption Vulnerability: Microsoft
Windows Scripting Engine contains a memory corruption
vulnerability that allows unauthenticated attacker to initiate
remote code execution via a specially crafted URL.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-13
-
Due Date: 2024-09-03
Microsoft | Project
Microsoft Project Remote Code
Execution Vulnerability : Microsoft
Project contains an unspecified vulnerability that allows for
remote code execution via a malicious file.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-13
-
Due Date: 2024-09-03
Apache | OFBiz
Apache OFBiz Path Traversal
Vulnerability: Apache
OFBiz contains a path traversal vulnerability that could allow
for remote code execution.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-07
-
Due Date: 2024-08-28
Android | Kernel
Android Kernel Remote Code
Execution Vulnerability: Android
contains an unspecified vulnerability in the kernel that allows
for remote code execution. This vulnerability resides in Linux
Kernel and could impact other products, including but not
limited to Android OS.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-08-07
-
Due Date: 2024-08-28
VMware | ESXi
VMware ESXi Authentication Bypass
Vulnerability: VMware
ESXi contains an authentication bypass vulnerability. A
malicious actor with sufficient Active Directory (AD)
permissions can gain full access to an ESXi host that was
previously configured to use AD for user management by
re-creating the configured AD group ('ESXi Admins' by default)
after it was deleted from AD.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-07-30
-
Due Date: 2024-08-20
ServiceNow | Utah, Vancouver,
and Washington DC Now Platform
ServiceNow Incomplete List of
Disallowed Inputs Vulnerability: ServiceNow
Washington DC, Vancouver, and earlier Now Platform releases
contain an incomplete list of disallowed inputs vulnerability in
the GlideExpression script. An unauthenticated user could
exploit this vulnerability to execute code remotely.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-07-29
-
Due Date: 2024-08-19
ServiceNow | Utah, Vancouver,
and Washington DC Now Platform
ServiceNow Improper Input
Validation Vulnerability: ServiceNow
Utah, Vancouver, and Washington DC Now Platform releases contain
a jelly template injection vulnerability in UI macros. An
unauthenticated user could exploit this vulnerability to execute
code remotely.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-07-29
-
Due Date: 2024-08-19
Twilio | Authy
Twilio Authy Information
Disclosure Vulnerability: Twilio
Authy contains an information disclosure vulnerability in its
API that allows an unauthenticated endpoint to accept a request
containing a phone number and respond with information about
whether the phone number was registered with Authy.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-07-23
-
Due Date: 2024-08-13
SolarWinds | Serv-U
SolarWinds Serv-U Path Traversal
Vulnerability : SolarWinds
Serv-U contains a path traversal vulnerability that allows an
attacker access to read sensitive files on the host machine.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-07-17
-
Due Date: 2024-08-07
Adobe | Commerce and Magento
Open Source
Adobe Commerce and Magento Open
Source Improper Restriction of XML External Entity Reference
(XXE) Vulnerability: Adobe
Commerce and Magento Open Source contain an improper restriction
of XML external entity reference (XXE) vulnerability that allows
for remote code execution.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-07-17
-
Due Date: 2024-08-07
OSGeo | GeoServer
OSGeo GeoServer GeoTools Eval
Injection Vulnerability: OSGeo
GeoServer GeoTools contains an improper neutralization of
directives in dynamically evaluated code vulnerability due to
unsafely evaluating property names as XPath expressions. This
allows unauthenticated attackers to conduct remote code
execution via specially crafted input.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-07-15
-
Due Date: 2024-08-05
Rejetto | HTTP File Server
Rejetto HTTP File Server Improper
Neutralization of Special Elements Used in a Template Engine
Vulnerability: Rejetto
HTTP File Server contains an improper neutralization of special
elements used in a template engine vulnerability. This allows a
remote, unauthenticated attacker to execute commands on the
affected system by sending a specially crafted HTTP request.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-07-09
-
Due Date: 2024-07-30
Microsoft | Windows
Microsoft Windows Hyper-V
Privilege Escalation Vulnerability: Microsoft
Windows Hyper-V contains a privilege escalation vulnerability
that allows a local attacker with user permissions to gain
SYSTEM privileges.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-07-09
-
Due Date: 2024-07-30
Microsoft | Windows
Microsoft Windows MSHTML Platform
Spoofing Vulnerability: Microsoft
Windows MSHTML Platform contains a spoofing vulnerability that
has a high impact to confidentiality, integrity, and
availability.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-07-09
-
Due Date: 2024-07-30
Cisco | NX-OS
Cisco NX-OS Command Injection
Vulnerability: Cisco
NX-OS contains a command injection vulnerability in the command
line interface (CLI) that could allow an authenticated, local
attacker to execute commands as root on the underlying operating
system of an affected device.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-07-02
-
Due Date: 2024-07-23
Progress | Telerik Report
Server
Progress Telerik Report Server
Authentication Bypass by Spoofing Vulnerability: Progress
Telerik Report Server contains an authorization bypass by
spoofing vulnerability that allows an attacker to obtain
unauthorized access.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-06-13
-
Due Date: 2024-07-04
Microsoft | Windows
Microsoft Windows Error Reporting
Service Improper Privilege Management Vulnerability: Microsoft
Windows Error Reporting Service contains an improper privilege
management vulnerability that allows a local attacker with user
permissions to gain SYSTEM privileges.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply updates per vendor instructions or
discontinue use of the product if updates are unavailable.
-
Date Added: 2024-06-13
-
Due Date: 2024-07-04
Android | Pixel
Android Pixel Privilege Escalation
Vulnerability: Android
Pixel contains an unspecified vulnerability in the firmware that
allows for privilege escalation.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-06-13
-
Due Date: 2024-07-04
PHP Group | PHP
PHP-CGI OS Command Injection
Vulnerability: PHP,
specifically Windows-based PHP used in CGI mode, contains an OS
command injection vulnerability that allows for arbitrary code
execution. This vulnerability is a patch bypass for
CVE-2012-1823.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-06-12
-
Due Date: 2024-07-03
Arm | Mali GPU Kernel Driver
Arm Mali GPU Kernel Driver
Use-After-Free Vulnerability: Arm
Bifrost and Valhall GPU kernel drivers contain a use-after-free
vulnerability that allows a local, non-privileged user to make
improper GPU memory processing operations to gain access to
already freed memory.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-06-12
-
Due Date: 2024-07-03
Linux | Kernel
Linux Kernel Use-After-Free
Vulnerability: Linux
kernel contains a use-after-free vulnerability in the netfilter:
nf_tables component that allows an attacker to achieve local
privilege escalation.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-05-30
-
Due Date: 2024-06-20
Check Point | Quantum Security
Gateways
Check Point Quantum Security
Gateways Information Disclosure Vulnerability: Check
Point Quantum Security Gateways contain an unspecified
information disclosure vulnerability. The vulnerability
potentially allows an attacker to access information on Gateways
connected to the internet, with IPSec VPN, Remote Access VPN or
Mobile Access enabled. This issue affects several product lines
from Check Point, including CloudGuard Network, Quantum Scalable
Chassis, Quantum Security Gateways, and Quantum Spark
Appliances.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-05-30
-
Due Date: 2024-06-20
Justice AV Solutions | Viewer
Justice AV Solutions (JAVS) Viewer
Installer Embedded Malicious Code Vulnerability: Justice
AV Solutions (JAVS) Viewer installer contains a malicious
version of ffmpeg.exe, named fffmpeg.exe (SHA256:
421a4ad2615941b177b6ec4ab5e239c14e62af2ab07c6df1741e2a62223223c4).
When run, this creates a backdoor connection to a malicious C2
server.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-05-29
-
Due Date: 2024-06-19
Google | Chromium V8
Google Chromium V8 Type Confusion
Vulnerability: Google
Chromium V8 contains a type confusion vulnerability that allows
a remote attacker to execute code via a crafted HTML page. This
vulnerability could affect multiple web browsers that utilize
Chromium, including, but not limited to, Google Chrome,
Microsoft Edge, and Opera.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-05-28
-
Due Date: 2024-06-18
Google | Chromium V8
Google Chromium V8 Type Confusion
Vulnerability: Google
Chromium V8 contains a type confusion vulnerability that allows
a remote attacker to execute code via a crafted HTML page.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-05-20
-
Due Date: 2024-06-10
Google | Chromium V8
Google Chromium V8 Out-of-Bounds
Memory Write Vulnerability: Google
Chromium V8 Engine contains an unspecified out-of-bounds memory
write vulnerability via a crafted HTML page. This vulnerability
could affect multiple web browsers that utilize Chromium,
including, but not limited to, Google Chrome, Microsoft Edge,
and Opera.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-05-16
-
Due Date: 2024-06-06
Microsoft | Windows
Microsoft Windows MSHTML Platform
Security Feature Bypass Vulnerability: Microsoft
Windows MSHTML Platform contains an unspecified vulnerability
that allows for a security feature bypass.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-05-14
-
Due Date: 2024-06-04
Microsoft | DWM Core Library
Microsoft DWM Core Library
Privilege Escalation Vulnerability: Microsoft
DWM Core Library contains a privilege escalation vulnerability
that allows an attacker to gain SYSTEM privileges.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-05-14
-
Due Date: 2024-06-04
Google | Chromium
Google Chromium Visuals
Use-After-Free Vulnerability: Google
Chromium Visuals contains a use-after-free vulnerability that
allows a remote attacker to exploit heap corruption via a
crafted HTML page. This vulnerability could affect multiple web
browsers that utilize Chromium, including, but not limited to,
Google Chrome, Microsoft Edge, and Opera.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-05-13
-
Due Date: 2024-06-03
Microsoft | SmartScreen Prompt
Microsoft SmartScreen Prompt
Security Feature Bypass Vulnerability: Microsoft
SmartScreen Prompt contains a security feature bypass
vulnerability that allows an attacker to bypass the Mark of the
Web (MotW) feature. This vulnerability can be chained with
CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-04-30
-
Due Date: 2024-05-21
CrushFTP | CrushFTP
CrushFTP VFS Sandbox Escape
Vulnerability: CrushFTP
contains an unspecified sandbox escape vulnerability that allows
a remote attacker to escape the CrushFTP virtual file system
(VFS).
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-04-24
-
Due Date: 2024-05-01
Cisco | Adaptive Security
Appliance (ASA) and Firepower Threat Defense (FTD)
Cisco ASA and FTD Privilege
Escalation Vulnerability: Cisco
Adaptive Security Appliance (ASA) and Firepower Threat Defense
(FTD) contain a privilege escalation vulnerability that can
allow local privilege escalation from Administrator to root.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-04-24
-
Due Date: 2024-05-01
Cisco | Adaptive Security
Appliance (ASA) and Firepower Threat Defense (FTD)
Cisco ASA and FTD Denial of
Service Vulnerability: Cisco
Adaptive Security Appliance (ASA) and Firepower Threat Defense
(FTD) contain an infinite loop vulnerability that can lead to
remote denial of service condition.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-04-24
-
Due Date: 2024-05-01
Palo Alto Networks | PAN-OS
Palo Alto Networks PAN-OS Command
Injection Vulnerability: Palo
Alto Networks PAN-OS GlobalProtect feature contains a command
injection vulnerability that allows an unauthenticated attacker
to execute commands with root privileges on the firewall.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions as
they become available. Otherwise, users with vulnerable
versions of affected devices should enable Threat Prevention
IDs available from the vendor. See the vendor bulletin for
more details and a patch release schedule.
-
Date Added: 2024-04-12
-
Due Date: 2024-04-19
D-Link | Multiple NAS Devices
D-Link Multiple NAS Devices
Command Injection Vulnerability: D-Link
DNS-320L, DNS-325, DNS-327L, and DNS-340L contain a command
injection vulnerability. When combined with CVE-2024-3272, this
can lead to remote, unauthorized code execution.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: This vulnerability affects legacy D-Link
products. All associated hardware revisions have reached
their end-of-life (EOL) or end-of-service (EOS) life cycle
and should be retired and replaced per vendor instructions.
-
Date Added: 2024-04-11
-
Due Date: 2024-05-02
D-Link | Multiple NAS Devices
D-Link Multiple NAS Devices Use of
Hard-Coded Credentials Vulnerability: D-Link
DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded
credential that allows an attacker to conduct authenticated
command injection, leading to remote, unauthorized code
execution.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: This vulnerability affects legacy D-Link
products. All associated hardware revisions have reached
their end-of-life (EOL) or end-of-service (EOS) life cycle
and should be retired and replaced per vendor instructions.
-
Date Added: 2024-04-11
-
Due Date: 2024-05-02
Android | Pixel
Android Pixel Privilege Escalation
Vulnerability: Android
Pixel contains a privilege escalation vulnerability that allows
an attacker to interrupt a factory reset triggered by a device
admin app.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-04-04
-
Due Date: 2024-04-25
Android | Pixel
Android Pixel Information
Disclosure Vulnerability: Android
Pixel contains an information disclosure vulnerability in the
fastboot firmware used to support unlocking, flashing, and
locking affected devices.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-04-04
-
Due Date: 2024-04-25
JetBrains | TeamCity
JetBrains TeamCity Authentication
Bypass Vulnerability: JetBrains
TeamCity contains an authentication bypass vulnerability that
allows an attacker to perform admin actions.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-03-07
-
Due Date: 2024-03-28
Apple | Multiple Products
Apple Multiple Products Memory
Corruption Vulnerability: Apple
iOS, iPadOS, macOS, tvOS, watchOS, and visionOS kernel contain a
memory corruption vulnerability that allows an attacker with
arbitrary kernel read and write capability to bypass kernel
memory protections.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-03-06
-
Due Date: 2024-03-27
Apple | Multiple Products
Apple Multiple Products Memory
Corruption Vulnerability: Apple
iOS, iPadOS, macOS, tvOS, and watchOS RTKit contain a memory
corruption vulnerability that allows an attacker with arbitrary
kernel read and write capability to bypass kernel memory
protections.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-03-06
-
Due Date: 2024-03-27
Microsoft | Windows
Microsoft Windows Kernel Exposed
IOCTL with Insufficient Access Control Vulnerability: Microsoft
Windows Kernel contains an exposed IOCTL with insufficient
access control vulnerability within the IOCTL (input and output
control) dispatcher in appid.sys that allows a local attacker to
achieve privilege escalation.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-03-04
-
Due Date: 2024-03-25
ConnectWise | ScreenConnect
ConnectWise ScreenConnect
Authentication Bypass Vulnerability: ConnectWise
ScreenConnect contains an authentication bypass vulnerability
that allows an attacker with network access to the management
interface to create a new, administrator-level account on
affected devices.
Known To Be Used in Ransomware
Campaigns? Known
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-02-22
-
Due Date: 2024-02-29
Microsoft | Exchange Server
Microsoft Exchange Server
Privilege Escalation Vulnerability: Microsoft
Exchange Server contains an unspecified vulnerability that
allows for privilege escalation.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-02-15
-
Due Date: 2024-03-07
Microsoft | Windows
Microsoft Windows Internet
Shortcut Files Security Feature Bypass Vulnerability: Microsoft
Windows Internet Shortcut Files contains an unspecified
vulnerability that allows for a security feature bypass.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-02-13
-
Due Date: 2024-03-05
Microsoft | Windows
Microsoft Windows SmartScreen
Security Feature Bypass Vulnerability: Microsoft
Windows SmartScreen contains a security feature bypass
vulnerability that allows an attacker to bypass the SmartScreen
user experience and inject code to potentially gain code
execution, which could lead to some data exposure, lack of
system availability, or both.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-02-13
-
Due Date: 2024-03-05
Fortinet | FortiOS
Fortinet FortiOS Out-of-Bound
Write Vulnerability: Fortinet
FortiOS contains an out-of-bound write vulnerability that allows
a remote unauthenticated attacker to execute code or commands
via specially crafted HTTP requests.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-02-09
-
Due Date: 2024-02-16
Ivanti | Connect Secure,
Policy Secure, and Neurons
Ivanti Connect Secure, Policy
Secure, and Neurons Server-Side Request Forgery (SSRF)
Vulnerability: Ivanti
Connect Secure (ICS, formerly known as Pulse Connect Secure),
Ivanti Policy Secure, and Ivanti Neurons contain a server-side
request forgery (SSRF) vulnerability in the SAML component that
allows an attacker to access certain restricted resources
without authentication.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-01-31
-
Due Date: 2024-02-02
Apple | Multiple Products
Apple Multiple Products WebKit
Type Confusion Vulnerability: Apple
iOS, iPadOS, macOS, tvOS, and Safari WebKit contain a type
confusion vulnerability that leads to code execution when
processing maliciously crafted web content. This vulnerability
could impact HTML parsers that use WebKit, including but not
limited to Apple Safari and non-Apple products which rely on
WebKit for HTML processing.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-01-23
-
Due Date: 2024-02-13
Google | Chromium V8
Google Chromium V8 Out-of-Bounds
Memory Access Vulnerability: Google
Chromium V8 Engine contains an out-of-bounds memory access
vulnerability that allows a remote attacker to potentially
exploit heap corruption via a crafted HTML page. This
vulnerability could affect multiple web browsers that utilize
Chromium, including, but not limited to, Google Chrome,
Microsoft Edge, and Opera.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-01-17
-
Due Date: 2024-02-07
Ivanti | Connect Secure and
Policy Secure
Ivanti Connect Secure and Policy
Secure Authentication Bypass Vulnerability: Ivanti
Connect Secure (ICS, formerly known as Pulse Connect Secure) and
Ivanti Policy Secure gateways contain an authentication bypass
vulnerability in the web component that allows an attacker to
access restricted resources by bypassing control checks. This
vulnerability can be leveraged in conjunction with
CVE-2024-21887, a command injection vulnerability.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-01-10
-
Due Date: 2024-01-22
Ivanti | Connect Secure and
Policy Secure
Ivanti Connect Secure and
Policy Secure Command Injection Vulnerability: Ivanti
Connect Secure (ICS, formerly known as Pulse Connect Secure) and
Ivanti Policy Secure contain a command injection vulnerability
in the web components of these products, which can allow an
authenticated administrator to send crafted requests to execute
code on affected appliances. This vulnerability can be leveraged
in conjunction with CVE-2023-46805, an authenticated bypass
issue.
Known To Be Used in Ransomware
Campaigns? Unknown
Action: Apply mitigations per vendor instructions or
discontinue use of the product if mitigations are
unavailable.
-
Date Added: 2024-01-10
-
Due Date: 2024-01-22
Trend Micro | Apex One,
OfficeScan, and Worry-Free Business Security
Trend Micro Multiple Products
Improper Access Control Vulnerability: Trend
Micro Apex One, OfficeScan, and Worry-Free Business Security on
Microsoft Windows contain an improper access control
vulnerability that may allow an attacker to manipulate a
particular product folder to disable the security temporarily,
abuse a specific Windows function, and attain privilege
escalation.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply updates per vendor instructions.
-
Date Added: 2021-11-03
-
Due Date: 2022-05-03