Exploited Vulnerabilities Catalog 2023(25)


H  2023(64 2022(113)  2021(179)  2020(128) 


GOOGLE CHROMIUM | WEBRTC

CVE-2023-7024

Google Chromium WebRTC Heap Buffer Overflow Vulnerability

Google Chromium WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows an attacker to cause crashes or code execution. This vulnerability could impact web browsers using WebRTC, including but not limited to Google Chrome.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2024-01-02

  • Due Date: 2024-01-23

Resources and Notes

SPREADSHEET::PARSEEXCEL | SPREADSHEET::PARSEEXCEL

CVE-2023-7101

Spreadsheet::ParseExcel Remote Code Execution Vulnerability

Spreadsheet::ParseExcel contains a remote code execution vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings within the Excel parsing logic.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2024-01-02

  • Due Date: 2024-01-23

Resources and Notes

QNAP | VIOSTOR NVR

CVE-2023-47565

QNAP VioStor NVR OS Command Injection Vulnerability

QNAP VioStar NVR contains an OS command injection vulnerability that allows authenticated users to execute commands via a network.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-12-21

  • Due Date: 2024-01-11

Resources and Notes

FXC | AE1021, AE1021PE

CVE-2023-49897

FXC AE1021, AE1021PE OS Command Injection Vulnerability

FXC AE1021 and AE1021PE contain an OS command injection vulnerability that allows authenticated users to execute commands via a network.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-12-21

  • Due Date: 2024-01-11

Resources and Notes

UNITRONICS | VISION PLC AND HMI

CVE-2023-6448

Unitronics Vision PLC and HMI Insecure Default Password Vulnerability

Unitronics Vision Series PLCs and HMIs ship with an insecure default password, which if left unchanged, can allow attackers to execute remote commands.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-12-11

  • Due Date: 2023-12-18

Resources and Notes

QLIK | SENSE

CVE-2023-41265

Qlik Sense HTTP Tunneling Vulnerability

Qlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.

  • Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-12-07

  • Due Date: 2023-12-28

Resources and Notes

QLIK | SENSE

CVE-2023-41266

Qlik Sense Path Traversal Vulnerability

Qlik Sense contains a path traversal vulnerability that allows a remote, unauthenticated attacker to create an anonymous session by sending maliciously crafted HTTP requests. This anonymous session could allow the attacker to send further requests to unauthorized endpoints.

  • Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-12-07

  • Due Date: 2023-12-28

Resources and Notes

QUALCOMM | MULTIPLE CHIPSETS

CVE-2022-22071

Qualcomm Multiple Chipsets Use-After-Free Vulnerability

Multiple Qualcomm chipsets contain a use-after-free vulnerability when process shell memory is freed using IOCTL munmap call and process initialization is in progress.

  • Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-12-05

  • Due Date: 2023-12-26

Resources and Notes

QUALCOMM | MULTIPLE CHIPSETS

CVE-2023-33063

Qualcomm Multiple Chipsets Use-After-Free Vulnerability

Multiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services during a remote call from HLOS to DSP.

  • Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-12-05

  • Due Date: 2023-12-26

Resources and Notes

QUALCOMM | MULTIPLE CHIPSETS

CVE-2023-33106

Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability

Multiple Qualcomm chipsets contain a use of out-of-range pointer offset vulnerability due to memory corruption in Graphics while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND.

  • Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-12-05

  • Due Date: 2023-12-26

Resources and Notes

QUALCOMM | MULTIPLE CHIPSETS

CVE-2023-33107

Qualcomm Multiple Chipsets Integer Overflow Vulnerability

Multiple Qualcomm chipsets contain an integer overflow vulnerability due to memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call.

  • Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-12-05

  • Due Date: 2023-12-26

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-42916

Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability

Apple iOS, iPadOS, macOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information when processing web content.

  • Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-12-04

  • Due Date: 2023-12-25

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-42917

Apple Multiple Products WebKit Memory Corruption Vulnerability

Apple iOS, iPadOS, macOS, and Safari WebKit contain a memory corruption vulnerability that leads to code execution when processing web content.

  • Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-12-04

  • Due Date: 2023-12-25

Resources and Notes

OWNCLOUD | OWNCLOUD GRAPHAPI

CVE-2023-49103

ownCloud graphapi Information Disclosure Vulnerability

ownCloud graphapi contains an information disclosure vulnerability that can reveal sensitive data stored in phpinfo() via GetPhpInfo.php, including administrative credentials.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-30

  • Due Date: 2023-12-21

Resources and Notes

GOOGLE | SKIA

CVE-2023-6345

Google Skia Integer Overflow Vulnerability

Google Skia contains an integer overflow vulnerability affecting Google Chrome and ChromeOS, Android, Flutter, and possibly other products.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-30

  • Due Date: 2023-12-21

Resources and Notes

GNU | GNU C LIBRARY

CVE-2023-4911

GNU C Library Buffer Overflow Vulnerability

GNU C Library's dynamic loader ld.so contains a buffer overflow vulnerability when processing the GLIBC_TUNABLES environment variable, allowing a local attacker to execute code with elevated privileges.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-21

  • Due Date: 2023-12-12

Resources and Notes

ORACLE | FUSION MIDDLEWARE

CVE-2020-2551

Oracle Fusion Middleware Unspecified Vulnerability

Oracle Fusion Middleware contains an unspecified vulnerability in the WLS Core Components that allows an unauthenticated attacker with network access via IIOP to compromise the WebLogic Server.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-16

  • Due Date: 2023-12-07

Resources and Notes

SOPHOS | WEB APPLIANCE

CVE-2023-1671

Sophos Web Appliance Command Injection Vulnerability

Sophos Web Appliance contains a command injection vulnerability in the warn-proceed handler that allows for remote code execution.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-16

  • Due Date: 2023-12-07

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-36584

Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability

Microsoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-16

  • Due Date: 2023-12-07

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-36036

Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability

Microsoft Windows Cloud Files Mini Filter Driver contains a privilege escalation vulnerability that could allow an attacker to gain SYSTEM privileges.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-14

  • Due Date: 2023-12-05

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-36025

Microsoft Windows SmartScreen Security Feature Bypass Vulnerability

Microsoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to bypass Windows Defender SmartScreen checks and their associated prompts.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-14

  • Due Date: 2023-12-05

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-36033

Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability

Microsoft Windows Desktop Window Manager (DWM) Core Library contains an unspecified vulnerability that allows for privilege escalation.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-14

  • Due Date: 2023-12-05

Resources and Notes

JUNIPER | JUNOS OS

CVE-2023-36851

Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability

Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-13

  • Due Date: 2023-11-17

Resources and Notes

JUNIPER | JUNOS OS

CVE-2023-36847

Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability

Juniper Junos OS on EX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-13

  • Due Date: 2023-11-17

Resources and Notes

JUNIPER | JUNOS OS

CVE-2023-36846

Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability

Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-13

  • Due Date: 2023-11-17

Resources and Notes

JUNIPER | JUNOS OS

CVE-2023-36845

Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability

Juniper Junos OS on EX Series and SRX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control an important environment variable. Using a crafted request, which sets the variable PHPRC, an attacker is able to modify the PHP execution environment allowing the injection und execution of code.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-13

  • Due Date: 2023-11-17

Resources and Notes

JUNIPER | JUNOS OS

CVE-2023-36844

Juniper Junos OS EX Series PHP External Variable Modification Vulnerability

Juniper Junos OS on EX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables, leading to partial loss of integrity, which may allow chaining to other vulnerabilities.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-13

  • Due Date: 2023-11-17

Resources and Notes

SYSAID | SYSAID SERVER

CVE-2023-47246

SysAid Server Path Traversal Vulnerability

SysAid Server (on-premises version) contains a path traversal vulnerability that leads to code execution.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-13

  • Due Date: 2023-12-04

Resources and Notes

IETF | SERVICE LOCATION PROTOCOL (SLP)

CVE-2023-29552

Service Location Protocol (SLP) Denial-of-Service Vulnerability

The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor.

  • Action: Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-11-08

  • Due Date: 2023-11-29

Resources and Notes

ATLASSIAN | CONFLUENCE DATA CENTER AND SERVER

CVE-2023-22518

Atlassian Confluence Data Center and Server Improper Authorization Vulnerability

Atlassian Confluence Data Center and Server contain an improper authorization vulnerability that can result in significant data loss when exploited by an unauthenticated attacker. There is no impact on confidentiality since the attacker cannot exfiltrate any data.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-11-07

  • Due Date: 2023-11-28

Resources and Notes

APACHE | ACTIVEMQ

CVE-2023-46604

Apache ActiveMQ Deserialization of Untrusted Data Vulnerability

Apache ActiveMQ contains a deserialization of untrusted data vulnerability that may allow a remote attacker with network access to a broker to run shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-11-02

  • Due Date: 2023-11-23

Resources and Notes

F5 | BIG-IP CONFIGURATION UTILITY

CVE-2023-46747

F5 BIG-IP Configuration Utility Authentication Bypass Vulnerability

F5 BIG-IP Configuration utility contains an authentication bypass using an alternate path or channel vulnerability due to undisclosed requests that may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46748.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-31

  • Due Date: 2023-11-21

Resources and Notes

F5 | BIG-IP CONFIGURATION UTILITY

CVE-2023-46748

F5 BIG-IP Configuration Utility SQL Injection Vulnerability

F5 BIG-IP Configuration utility contains an SQL injection vulnerability that may allow an authenticated attacker with network access through the BIG-IP management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46747.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-31

  • Due Date: 2023-11-21

Resources and Notes

ROUNDCUBE | WEBMAIL

CVE-2023-5631

Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability

Roundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that allows a remote attacker to run malicious JavaScript code.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-26

  • Due Date: 2023-11-16

Resources and Notes

CISCO | CISCO IOS XE WEB UI

CVE-2023-20273

Cisco IOS XE Web UI Command Injection Vulnerability

Cisco IOS XE contains a command injection vulnerability in the web user interface. When chained with CVE-2023-20198, the attacker can leverage the new local user to elevate privilege to root and write the implant to the file system. Cisco identified CVE-2023-20273 as the vulnerability exploited to deploy the implant. CVE-2021-1435, previously associated with the exploitation events, is no longer believed to be related to this activity.

  • Action: Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-23

  • Due Date: 2023-10-27

Resources and Notes

CITRIX | NETSCALER ADC AND NETSCALER GATEWAY

CVE-2023-4966

Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability

Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for sensitive information disclosure when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.

  • Action: Apply mitigations and kill all active and persistent sessions per vendor instructions [https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/] OR discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-10-18

  • Due Date: 2023-11-08

Resources and Notes

CISCO | IOS XE WEB UI

CVE-2023-20198

Cisco IOS XE Web UI Privilege Escalation Vulnerability

Cisco IOS XE Web UI contains a privilege escalation vulnerability in the web user interface that could allow a remote, unauthenticated attacker to create an account with privilege level 15 access. The attacker can then use that account to gain control of the affected device.

  • Action: Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-16

  • Due Date: 2023-10-20

Resources and Notes

IETF | HTTP/2

CVE-2023-44487

HTTP/2 Rapid Reset Attack Vulnerability

HTTP/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS).

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-10

  • Due Date: 2023-10-31

Resources and Notes

MICROSOFT | WORDPAD

CVE-2023-36563

Microsoft WordPad Information Disclosure Vulnerability

Microsoft WordPad contains an unspecified vulnerability that allows for information disclosure.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-10

  • Due Date: 2023-10-31

Resources and Notes

MICROSOFT | SKYPE FOR BUSINESS

CVE-2023-41763

Microsoft Skype for Business Privilege Escalation Vulnerability

Microsoft Skype for Business contains an unspecified vulnerability that allows for privilege escalation.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-10

  • Due Date: 2023-10-31

Resources and Notes

CISCO | IOS AND IOS XE

CVE-2023-20109

Cisco IOS and IOS XE Group Encrypted Transport VPN Out-of-Bounds Write Vulnerability

Cisco IOS and IOS XE contain an out-of-bounds write vulnerability in the Group Encrypted Transport VPN (GET VPN) feature that could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute malicious code or cause a device to crash.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-10

  • Due Date: 2023-10-31

Resources and Notes

ADOBE | ACROBAT AND READER

CVE-2023-21608

Adobe Acrobat and Reader Use-After-Free Vulnerability

Adobe Acrobat and Reader contains a use-after-free vulnerability that allows for code execution in the context of the current user.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-10

  • Due Date: 2023-10-31

Resources and Notes

APPLE | IOS AND IPADOS

CVE-2023-42824

Apple iOS and iPadOS Kernel Privilege Escalation Vulnerability

Apple iOS and iPadOS contain an unspecified vulnerability that allows for local privilege escalation.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-05

  • Due Date: 2023-10-26

Resources and Notes

PROGRESS | WS_FTP SERVER

CVE-2023-40044

Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability

Progress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-10-05

  • Due Date: 2023-10-26

Resources and Notes

ATLASSIAN | CONFLUENCE DATA CENTER AND SERVER

CVE-2023-22515

Atlassian Confluence Data Center and Server Broken Access Control Vulnerability

Atlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-10-05

  • Due Date: 2023-10-13

Resources and Notes

MICROSOFT | WINDOWS CNG KEY ISOLATION SERVICE

CVE-2023-28229

Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability

Microsoft Windows Cryptographic Next Generation (CNG) Key Isolation Service contains an unspecified vulnerability that allows an attacker to gain specific limited SYSTEM privileges.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-04

  • Due Date: 2023-10-25

Resources and Notes

JETBRAINS | TEAMCITY

CVE-2023-42793

JetBrains TeamCity Authentication Bypass Vulnerability

JetBrains TeamCity contains an authentication bypass vulnerability that allows for remote code execution on TeamCity Server.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-10-04

  • Due Date: 2023-10-25

Resources and Notes

ARM | MALI GPU KERNEL DRIVER

CVE-2023-4211

Arm Mali GPU Kernel Driver Use-After-Free Vulnerability

Arm Mali GPU Kernel Driver contains a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-03

  • Due Date: 2023-10-24

Resources and Notes

GOOGLE | CHROME LIBVPX

CVE-2023-5217

Google Chrome libvpx Heap Buffer Overflow Vulnerability

Google Chrome libvpx contains a heap buffer overflow vulnerability in vp8 encoding that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-10-02

  • Due Date: 2023-10-23

Resources and Notes

RED HAT | JBOSS RICHFACES FRAMEWORK

CVE-2018-14667

Red Hat JBoss RichFaces Framework Expression Language Injection Vulnerability

Red Hat JBoss RichFaces Framework contains an expression language injection vulnerability via the UserResource resource. A remote, unauthenticated attacker could exploit this vulnerability to execute malicious code using a chain of Java serialized objects via org.ajax4jsf.resource.UserResource$UriData.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-28

  • Due Date: 2023-10-19

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-41993

Apple Multiple Products WebKit Code Execution Vulnerability

Apple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that can allow an attacker to execute code when processing web content.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-25

  • Due Date: 2023-10-16

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-41992

Apple Multiple Products Kernel Privilege Escalation Vulnerability

Apple iOS, iPadOS, macOS, and watchOS contain an unspecified vulnerability that allows for local privilege escalation.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-25

  • Due Date: 2023-10-16

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-41991

Apple Multiple Products Improper Certificate Validation Vulnerability

Apple iOS, iPadOS, macOS, and watchOS contain an improper certificate validation vulnerability that can allow a malicious app to bypass signature validation.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-25

  • Due Date: 2023-10-16

Resources and Notes

TREND MICRO | APEX ONE AND WORRY-FREE BUSINESS SECURITY

CVE-2023-41179

Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability

Trend Micro Apex One and Worry-Free Business Security contain an unspecified vulnerability in the third-party anti-virus uninstaller that could allow an attacker to manipulate the module to conduct remote code execution. An attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-21

  • Due Date: 2023-10-12

Resources and Notes

MINIO | MINIO

CVE-2023-28434

MinIO Security Feature Bypass Vulnerability

MinIO contains a security feature bypass vulnerability that allows an attacker to use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket` to conduct privilege escalation. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-19

  • Due Date: 2023-10-10

Resources and Notes

LARAVEL | IGNITION

CVE-2021-3129

Laravel Ignition File Upload Vulnerability

Laravel Ignition contains a file upload vulnerability that allows unauthenticated remote attackers to execute malicious code due to insecure usage of file_get_contents() and file_put_contents().

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-18

  • Due Date: 2023-10-09

Resources and Notes

ZYXEL | EMG2926 ROUTERS

CVE-2017-6884

Zyxel EMG2926 Routers Command Injection Vulnerability

Zyxel EMG2926 routers contain a command injection vulnerability located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute malicious commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-18

  • Due Date: 2023-10-09

Resources and Notes

REALTEK | SDK

CVE-2014-8361

Realtek SDK Improper Input Validation Vulnerability

Realtek SDK contains an improper input validation vulnerability in the miniigd SOAP service that allows remote attackers to execute malicious code via a crafted NewInternalClient request.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-18

  • Due Date: 2023-10-09

Resources and Notes

SAMSUNG | MOBILE DEVICES

CVE-2022-22265

Samsung Mobile Devices Use-After-Free Vulnerability

Samsung devices with selected Exynos chipsets contain a use-after-free vulnerability that allows malicious memory write and code execution.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-18

  • Due Date: 2023-10-09

Resources and Notes

ADOBE | ACROBAT AND READER

CVE-2023-26369

Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability

Adobe Acrobat and Reader contains an out-of-bounds write vulnerability that allows for code execution.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-14

  • Due Date: 2023-10-05

Resources and Notes

GOOGLE | CHROMIUM WEBP

CVE-2023-4863

Google Chromium WebP Heap-Based Buffer Overflow Vulnerability

Google Chromium WebP contains a heap-based buffer overflow vulnerability that allows a remote attacker to perform an out-of-bounds memory write via a crafted HTML page. This vulnerability can affect applications that use the WebP Codec.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-13

  • Due Date: 2023-10-04

Resources and Notes

CISCO | ADAPTIVE SECURITY APPLIANCE AND FIREPOWER THREAT DEFENSE

CVE-2023-20269

Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability

Cisco Adaptive Security Appliance and Firepower Threat Defense contain an unauthorized access vulnerability that could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or establish a clientless SSL VPN session with an unauthorized user.

  • Action: Apply mitigations per vendor instructions for group-lock and vpn-simultaneous-logins or discontinue use of the product for unsupported devices.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-09-13

  • Due Date: 2023-10-04

Resources and Notes

ANDROID | FRAMEWORK

CVE-2023-35674

Android Framework Privilege Escalation Vulnerability

Android Framework contains an unspecified vulnerability that allows for privilege escalation.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-13

  • Due Date: 2023-10-04

Resources and Notes

MICROSOFT | STREAMING SERVICE PROXY

CVE-2023-36802

Microsoft Streaming Service Proxy Privilege Escalation Vulnerability

Microsoft Streaming Service Proxy contains an unspecified vulnerability that allows for privilege escalation.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-12

  • Due Date: 2023-10-03

Resources and Notes

MICROSOFT | WORD

CVE-2023-36761

Microsoft Word Information Disclosure Vulnerability

Microsoft Word contains an unspecified vulnerability that allows for information disclosure.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-12

  • Due Date: 2023-10-03

Resources and Notes

APPLE | IOS, IPADOS, AND WATCHOS

CVE-2023-41061

Apple iOS, iPadOS, and watchOS Wallet Code Execution Vulnerability

Apple iOS, iPadOS, and watchOS contain an unspecified vulnerability due to a validation issue affecting Wallet in which a maliciously crafted attachment may result in code execution. This vulnerability was chained with CVE-2023-41064.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-11

  • Due Date: 2023-10-02

Resources and Notes

APPLE | IOS, IPADOS, AND MACOS

CVE-2023-41064

Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability

Apple iOS, iPadOS, and macOS contain a buffer overflow vulnerability in ImageIO when processing a maliciously crafted image, which may lead to code execution. This vulnerability was chained with CVE-2023-41061.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-11

  • Due Date: 2023-10-02

Resources and Notes

APACHE | ROCKETMQ

CVE-2023-33246

Apache RocketMQ Command Execution Vulnerability

Several components of Apache RocketMQ, including NameServer, Broker, and Controller, are exposed to the extranet and lack permission verification. An attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as or achieve the same effect by forging the RocketMQ protocol content.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-09-06

  • Due Date: 2023-09-27

Resources and Notes

IGNITE REALTIME | OPENFIRE

CVE-2023-32315

Ignite Realtime Openfire Path Traversal Vulnerability

Ignite Realtime Openfire contains a path traversal vulnerability that allows an unauthenticated attacker to access restricted pages in the Openfire Admin Console reserved for administrative users.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-08-24

  • Due Date: 2023-09-14

Resources and Notes

RARLAB | WINRAR

CVE-2023-38831

RARLAB WinRAR Code Execution Vulnerability

RARLAB WinRAR contains an unspecified vulnerability that allows an attacker to execute code when a user attempts to view a benign file within a ZIP archive.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-08-24

  • Due Date: 2023-09-14

Resources and Notes

VEEAM | BACKUP & REPLICATION

CVE-2023-27532

Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability

Veeam Backup & Replication Cloud Connect component contains a missing authentication for critical function vulnerability that allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker gaining access to the backup infrastructure hosts.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-08-22

  • Due Date: 2023-09-12

Resources and Notes

IVANTI | SENTRY

CVE-2023-38035

Ivanti Sentry Authentication Bypass Vulnerability

Ivanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability that may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-08-22

  • Due Date: 2023-09-12

Resources and Notes

ADOBE | COLDFUSION

CVE-2023-26359

Adobe ColdFusion Deserialization of Untrusted Data Vulnerability

Adobe ColdFusion contains a deserialization of untrusted data vulnerability that could result in code execution in the context of the current user.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-08-21

  • Due Date: 2023-09-11

Resources and Notes

CITRIX | CONTENT COLLABORATION

CVE-2023-24489

Citrix Content Collaboration ShareFile Improper Access Control Vulnerability

Citrix Content Collaboration contains an improper access control vulnerability that could allow an unauthenticated attacker to remotely compromise customer-managed ShareFile storage zones controllers.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-08-16

  • Due Date: 2023-09-06

Resources and Notes

MICROSOFT | .NET CORE AND VISUAL STUDIO

CVE-2023-38180

Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability

Microsoft .NET Core and Visual Studio contain an unspecified vulnerability that allows for denial-of-service (DoS).

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-08-09

  • Due Date: 2023-08-30

Resources and Notes

ZYXEL | P660HN-T1A ROUTERS

CVE-2017-18368

Zyxel P660HN-T1A Routers Command Injection Vulnerability

Zyxel P660HN-T1A routers contain a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user and exploited via the remote_host parameter of the ViewLog.asp page.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-08-07

  • Due Date: 2023-08-28

Resources and Notes

IVANTI | ENDPOINT MANAGER MOBILE (EPMM)

CVE-2023-35081

Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability

Ivanti Endpoint Manager Mobile (EPMM) contains a path traversal vulnerability that enables an authenticated administrator to perform malicious file writes to the EPMM server. This vulnerability can be used in conjunction with CVE-2023-35078 to bypass authentication and ACLs restrictions (if applicable).

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-31

  • Due Date: 2023-08-21

Resources and Notes

ZIMBRA | COLLABORATION (ZCS)

CVE-2023-37580

Zimbra Collaboration (ZCS) Cross-Site Scripting (XSS) Vulnerability

Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability impacting the confidentiality and integrity of data.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-27

  • Due Date: 2023-08-17

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-38606

Apple Multiple Products Kernel Unspecified Vulnerability

Apple iOS, iPadOS, macOS, tvOS, and watchOS contain an unspecified vulnerability allowing an app to modify a sensitive kernel state.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-26

  • Due Date: 2023-08-16

Resources and Notes

IVANTI | ENDPOINT MANAGER MOBILE (EPMM)

CVE-2023-35078

Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability

Ivanti Endpoint Manager Mobile (EPMM, previously branded MobileIron Core) contains an authentication bypass vulnerability that allows unauthenticated access to specific API paths. An attacker with access to these API paths can access personally identifiable information (PII) such as names, phone numbers, and other mobile device details for users on a vulnerable system. An attacker can also make other configuration changes including installing software and modifying security profiles on registered devices.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-07-25

  • Due Date: 2023-08-15

Resources and Notes

ADOBE | COLDFUSION

CVE-2023-38205

Adobe ColdFusion Improper Access Control Vulnerability

Adobe ColdFusion contains an improper access control vulnerability that allows for a security feature bypass.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-20

  • Due Date: 2023-08-10

Resources and Notes

ADOBE | COLDFUSION

CVE-2023-29298

Adobe ColdFusion Improper Access Control Vulnerability

Adobe ColdFusion contains an improper access control vulnerability that allows for a security feature bypass.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-20

  • Due Date: 2023-08-10

Resources and Notes

CITRIX | NETSCALER ADC AND NETSCALER GATEWAY

CVE-2023-3519

Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability

Citrix NetScaler ADC and NetScaler Gateway contains a code injection vulnerability that allows for unauthenticated remote code execution.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-07-19

  • Due Date: 2023-08-09

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-36884

Microsoft Windows Search Remote Code Execution Vulnerability

Microsoft Windows Search contains an unspecified vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file, leading to remote code execution.

  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-07-17

  • Due Date: 2023-08-29

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-37450

Apple Multiple Products WebKit Code Execution Vulnerability

Apple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that can allow an attacker to execute code when processing web content.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-13

  • Due Date: 2023-08-03

Resources and Notes

SOLARVIEW | COMPACT

CVE-2022-29303

SolarView Compact Command Injection Vulnerability

SolarView Compact contains a command injection vulnerability due to improper validation of input values on the send test mail console of the product's web server.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-13

  • Due Date: 2023-08-03

Resources and Notes

NETWRIX | AUDITOR

CVE-2022-31199

Netwrix Auditor Insecure Object Deserialization Vulnerability

Netwrix Auditor User Activity Video Recording component contains an insecure objection deserialization vulnerability that allows an unauthenticated, remote attacker to execute code as the NT AUTHORITY\SYSTEM user. Successful exploitation requires that the attacker is able to reach port 9004/TCP, which is commonly blocked by standard enterprise firewalling.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-07-11

  • Due Date: 2023-08-01

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-36874

Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability

Microsoft Windows Error Reporting Service contains an unspecified vulnerability that allows for privilege escalation.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-11

  • Due Date: 2023-08-01

Resources and Notes

MICROSOFT | OUTLOOK

CVE-2023-35311

Microsoft Outlook Security Feature Bypass Vulnerability

Microsoft Outlook contains a security feature bypass vulnerability that allows an attacker to bypass the Microsoft Outlook Security Notice prompt.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-11

  • Due Date: 2023-08-01

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-32049

Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability

Microsoft Windows Defender SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the Open File - Security Warning prompt.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-11

  • Due Date: 2023-08-01

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-32046

Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability

Microsoft Windows MSHTML Platform contains an unspecified vulnerability that allows for privilege escalation.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-11

  • Due Date: 2023-08-01

Resources and Notes

ARM | MALI GRAPHICS PROCESSING UNIT (GPU)

CVE-2021-29256

Arm Mali GPU Kernel Driver Use-After-Free Vulnerability

Arm Mali GPU Kernel Driver contains a use-after-free vulnerability that may allow a non-privileged user to gain root privilege and/or disclose information.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-07-07

  • Due Date: 2023-07-28

Resources and Notes

SAMSUNG | MOBILE DEVICES

CVE-2021-25372

Samsung Mobile Devices Improper Boundary Check Vulnerability

Samsung mobile devices contain an improper boundary check vulnerability within DSP driver that allows for out-of-bounds memory access.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-29

  • Due Date: 2023-07-20

Resources and Notes

SAMSUNG | MOBILE DEVICES

CVE-2021-25371

Samsung Mobile Devices Unspecified Vulnerability

Samsung mobile devices contain an unspecified vulnerability within DSP driver that allows attackers to load ELF libraries inside DSP.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-29

  • Due Date: 2023-07-20

Resources and Notes

SAMSUNG | MOBILE DEVICES

CVE-2021-25395

Samsung Mobile Devices Race Condition Vulnerability

Samsung mobile devices contain a race condition vulnerability within the MFC charger driver that leads to a use-after-free allowing for a write given a radio privilege is compromised.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-29

  • Due Date: 2023-07-20

Resources and Notes

SAMSUNG | MOBILE DEVICES

CVE-2021-25394

Samsung Mobile Devices Race Condition Vulnerability

Samsung mobile devices contain a race condition vulnerability within the MFC charger driver that leads to a use-after-free allowing for a write given a radio privilege is compromised.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-29

  • Due Date: 2023-07-20

Resources and Notes

SAMSUNG | MOBILE DEVICES

CVE-2021-25489

Samsung Mobile Devices Improper Input Validation Vulnerability

Samsung mobile devices contain an improper input validation vulnerability within the modem interface driver that results in a format string bug leading to kernel panic.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-29

  • Due Date: 2023-07-20

Resources and Notes

SAMSUNG | MOBILE DEVICES

CVE-2021-25487

Samsung Mobile Devices Out-of-Bounds Read Vulnerability

Samsung mobile devices contain an out-of-bounds read vulnerability within the modem interface driver due to a lack of boundary checking of a buffer in set_skb_priv(), leading to remote code execution by dereference of an invalid function pointer.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-29

  • Due Date: 2023-07-20

Resources and Notes

D-LINK | DWL-2600AP ACCESS POINT

CVE-2019-20500

D-Link DWL-2600AP Access Point Command Injection Vulnerability

D-Link DWL-2600AP access point contains an authenticated command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-29

  • Due Date: 2023-07-20

Resources and Notes

D-LINK | DIR-859 ROUTER

CVE-2019-17621

D-Link DIR-859 Router Command Execution Vulnerability

D-Link DIR-859 router contains a command execution vulnerability in the UPnP endpoint URL, /gena.cgi. Exploitation allows an unauthenticated remote attacker to execute system commands as root by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.

  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-29

  • Due Date: 2023-07-20

ZYXEL | MULTIPLE NETWORK-ATTACHED STORAGE (NAS) DEVICES

CVE-2023-27992

Zyxel Multiple NAS Devices Command Injection Vulnerability

Multiple Zyxel network-attached storage (NAS) devices contain a pre-authentication command injection vulnerability that could allow an unauthenticated attacker to execute commands remotely via a crafted HTTP request.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-23

  • Due Date: 2023-07-14

Resources and Notes

VMWARE | TOOLS

CVE-2023-20867

VMware Tools Authentication Bypass Vulnerability

VMware Tools contains an authentication bypass vulnerability in the vgauth module. A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. An attacker must have root access over ESXi to exploit this vulnerability.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-23

  • Due Date: 2023-07-14

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-32439

Apple Multiple Products WebKit Type Confusion Vulnerability

Apple iOS, iPadOS, macOS, and Safari WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-23

  • Due Date: 2023-07-14

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-32435

Apple Multiple Products WebKit Memory Corruption Vulnerability

Apple iOS, iPadOS, macOS, and Safari WebKit contain a memory corruption vulnerability that leads to code execution when processing web content.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-23

  • Due Date: 2023-07-14

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-32434

Apple Multiple Products Integer Overflow Vulnerability

Apple iOS. iPadOS, macOS, and watchOS contain an integer overflow vulnerability that could allow an application to execute code with kernel privileges.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-23

  • Due Date: 2023-07-14

Resources and Notes

MICROSOFT | WIN32K

CVE-2016-0165

Microsoft Win32k Privilege Escalation Vulnerability

Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-22

  • Due Date: 2023-07-13

Resources and Notes

MOZILLA | FIREFOX, FIREFOX ESR, AND THUNDERBIRD

CVE-2016-9079

Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability

Mozilla Firefox, Firefox ESR, and Thunderbird contain a use-after-free vulnerability in SVG Animation, targeting Firefox and Tor browser users on Windows.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-22

  • Due Date: 2023-07-13

Resources and Notes

ROUNDCUBE | ROUNDCUBE WEBMAIL

CVE-2021-44026

Roundcube Webmail SQL Injection Vulnerability

Roundcube Webmail is vulnerable to SQL injection via search or search_params.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-22

  • Due Date: 2023-07-13

Resources and Notes

ROUNDCUBE | ROUNDCUBE WEBMAIL

CVE-2020-12641

Roundcube Webmail Remote Code Execution Vulnerability

Roundcube Webmail contains an remote code execution vulnerability that allows attackers to execute code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-22

  • Due Date: 2023-07-13

Resources and Notes

ROUNDCUBE | ROUNDCUBE WEBMAIL

CVE-2020-35730

Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability

Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows an attacker to send a plain text e-mail message with Javascript in a link reference element that is mishandled by linkref_addinindex in rcube_string_replacer.php.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-22

  • Due Date: 2023-07-13

Resources and Notes

VMWARE | ARIA OPERATIONS FOR NETWORKS

CVE-2023-20887

Vmware Aria Operations for Networks Command Injection Vulnerability

VMware Aria Operations for Networks (formerly vRealize Network Insight) contains a command injection vulnerability that allows a malicious actor with network access to perform an attack resulting in remote code execution.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-22

  • Due Date: 2023-07-13

Resources and Notes

FORTINET | FORTIOS AND FORTIPROXY SSL-VPN

CVE-2023-27997

Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability

Fortinet FortiOS and FortiProxy SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute code or commands via specifically crafted requests.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-13

  • Due Date: 2023-07-04

Resources and Notes

GOOGLE | CHROMIUM V8 ENGINE

CVE-2023-3079

Google Chromium V8 Type Confusion Vulnerability

Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-07

  • Due Date: 2023-06-28

Resources and Notes

ZYXEL | MULTIPLE FIREWALLS

CVE-2023-33010

Zyxel Multiple Firewalls Buffer Overflow Vulnerability

Zyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the ID processing function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-05

  • Due Date: 2023-06-26

Resources and Notes

ZYXEL | MULTIPLE FIREWALLS

CVE-2023-33009

Zyxel Multiple Firewalls Buffer Overflow Vulnerability

Zyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the notification function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-06-05

  • Due Date: 2023-06-26

Resources and Notes

PROGRESS | MOVEIT TRANSFER

CVE-2023-34362

Progress MOVEit Transfer SQL Injection Vulnerability

Progress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delete database elements.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-06-02

  • Due Date: 2023-06-23

Resources and Notes

ZYXEL | MULTIPLE FIREWALLS

CVE-2023-28771

Zyxel Multiple Firewalls OS Command Injection Vulnerability

Zyxel ATP, USG FLEX, VPN, and ZyWALL/USG firewalls allow for improper error message handling which could allow an unauthenticated attacker to execute OS commands remotely by sending crafted packets to an affected device.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-31

  • Due Date: 2023-06-21

Resources and Notes

BARRACUDA NETWORKS | EMAIL SECURITY GATEWAY (ESG) APPLIANCE

CVE-2023-2868

Barracuda Networks ESG Appliance Improper Input Validation Vulnerability

Barracuda Email Security Gateway (ESG) appliance contains an improper input validation vulnerability of a user-supplied .tar file, leading to remote command injection.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-26

  • Due Date: 2023-06-16

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-32373

Apple Multiple Products WebKit Use-After-Free Vulnerability

Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-22

  • Due Date: 2023-06-12

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-28204

Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability

Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-22

  • Due Date: 2023-06-12

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-32409

Apple Multiple Products WebKit Sandbox Escape Vulnerability

Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an unspecified vulnerability that can allow a remote attacker to break out of the Web Content sandbox.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-22

  • Due Date: 2023-06-12

Resources and Notes

SAMSUNG | MOBILE DEVICES

CVE-2023-21492

Samsung Mobile Devices Insertion of Sensitive Information Into Log File Vulnerability

Samsung mobile devices running Android 11, 12, and 13 contain an insertion of sensitive information into log file vulnerability that allows a privileged, local attacker to conduct an address space layout randomization (ASLR) bypass.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-19

  • Due Date: 2023-06-09

Resources and Notes

CISCO | IOS, IOS XR, AND IOS XE

CVE-2016-6415

Cisco IOS, IOS XR, and IOS XE IKEv1 Information Disclosure Vulnerability

Cisco IOS, IOS XR, and IOS XE contain insufficient condition checks in the part of the code that handles Internet Key Exchange version 1 (IKEv1) security negotiation requests. contains an information disclosure vulnerability in the Internet Key Exchange version 1 (IKEv1) that could allow an attacker to retrieve memory contents. Successful exploitation could allow the attacker to retrieve memory contents, which can lead to information disclosure.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-19

  • Due Date: 2023-06-09

Resources and Notes

CISCO | IOS

CVE-2004-1464

Cisco IOS Denial-of-Service Vulnerability

Cisco IOS contains an unspecified vulnerability that may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases, Hypertext Transport Protocol (HTTP) access to the Cisco device.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-19

  • Due Date: 2023-06-09

Resources and Notes

APACHE | TOMCAT

CVE-2016-8735

Apache Tomcat Remote Code Execution Vulnerability

Apache Tomcat contains an unspecified vulnerability that allows for remote code execution if JmxRemoteLifecycleListener is used and an attacker can reach Java Management Extension (JMX) ports. This CVE exists because this listener wasn't updated for consistency with the Oracle patched issues for CVE-2016-3427 which affected credential types.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-12

  • Due Date: 2023-06-02

Resources and Notes

ORACLE | JAVA SE AND JROCKIT

CVE-2016-3427

Oracle Java SE and JRockit Unspecified Vulnerability

Oracle Java SE and JRockit contains an unspecified vulnerability that allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Java Management Extensions (JMX). This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-12

  • Due Date: 2023-06-02

Resources and Notes

JENKINS | JENKINS USER INTERFACE (UI)

CVE-2015-5317

Jenkins User Interface (UI) Information Disclosure Vulnerability

Jenkins User Interface (UI) contains an information disclosure vulnerability that allows users to see the names of jobs and builds otherwise inaccessible to them on the "Fingerprints" pages.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-12

  • Due Date: 2023-06-02

Resources and Notes

LINUX | KERNEL

CVE-2010-3904

Linux Kernel Improper Input Validation Vulnerability

Linux Kernel contains an improper input validation vulnerability in the Reliable Datagram Sockets (RDS) protocol implementation that allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.

  • Action: The impacted product is end-of-life and should be disconnected if still in use.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-12

  • Due Date: 2023-06-02

Resources and Notes

LINUX | KERNEL

CVE-2014-0196

Linux Kernel Race Condition Vulnerability

Linux Kernel contains a race condition vulnerability within the n_tty_write function that allows local users to cause a denial-of-service (DoS) or gain privileges via read and write operations with long strings.

  • Action: The impacted product is end-of-life and should be disconnected if still in use.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-12

  • Due Date: 2023-06-02

Resources and Notes

RED HAT | POLKIT

CVE-2021-3560

Red Hat Polkit Incorrect Authorization Vulnerability

Red Hat Polkit contains an incorrect authorization vulnerability through the bypassing of credential checks for D-Bus requests, allowing for privilege escalation.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-12

  • Due Date: 2023-06-02

Resources and Notes

RUCKUS WIRELESS | MULTIPLE PRODUCTS

CVE-2023-25717

Multiple Ruckus Wireless Products CSRF and RCE Vulnerability

Ruckus Wireless Access Point (AP) software contains an unspecified vulnerability in the web services component. If the web services component is enabled on the AP, an attacker can perform cross-site request forgery (CSRF) or remote code execution (RCE). This vulnerability impacts Ruckus ZoneDirector, SmartZone, and Solo APs.

  • Action: Apply updates per vendor instructions or disconnect product if it is end-of-life.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-12

  • Due Date: 2023-06-02

Resources and Notes

MICROSOFT | WIN32K

CVE-2023-29336

Microsoft Win32K Privilege Escalation Vulnerability

Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation up to SYSTEM privileges.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-09

  • Due Date: 2023-05-30

Resources and Notes

ORACLE | WEBLOGIC SERVER

CVE-2023-21839

Oracle WebLogic Server Unspecified Vulnerability

Oracle WebLogic Server contains an unspecified vulnerability that allows an unauthenticated attacker with network access via T3, IIOP, to compromise Oracle WebLogic Server.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-01

  • Due Date: 2023-05-22

Resources and Notes

APACHE | LOG4J2

CVE-2021-45046

Apache Log4j2 Deserialization of Untrusted Data Vulnerability

Apache Log4j2 contains a deserialization of untrusted data vulnerability due to the incomplete fix of CVE-2021-44228, where the Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-05-01

  • Due Date: 2023-05-22

Resources and Notes

TP-LINK | ARCHER AX21

CVE-2023-1389

TP-Link Archer AX-21 Command Injection Vulnerability

TP-Link Archer AX-21 contains a command injection vulnerability that allows for remote code execution.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-05-01

  • Due Date: 2023-05-22

Resources and Notes

GOOGLE | CHROME

CVE-2023-2136

Google Chrome Skia Integer Overflow Vulnerability

Google Chrome Skia contains an integer overflow vulnerability. Specific impacts from exploitation are not available at this time. This vulnerability resides in Skia which serves as the graphics engine for Google Chrome and ChromeOS, Android, Flutter, and other products.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-04-21

  • Due Date: 2023-05-12

Resources and Notes

PAPERCUT | MF/NG

CVE-2023-27350

PaperCut MF/NG Improper Access Control Vulnerability

PaperCut MF/NG contains an improper access control vulnerability within the SetupCompleted class that allows authentication bypass and code execution in the context of system.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-04-21

  • Due Date: 2023-05-12

Resources and Notes

MINIO | MINIO

CVE-2023-28432

MinIO Information Disclosure Vulnerability

MinIO contains a vulnerability in a cluster deployment where MinIO returns all environment variables, which allows for information disclosure.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-04-21

  • Due Date: 2023-05-12

Resources and Notes

CISCO | IOS AND IOS XE SOFTWARE

CVE-2017-6742

Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability

The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-04-19

  • Due Date: 2023-05-10

Resources and Notes

GOOGLE | CHROMIUM V8 ENGINE

CVE-2023-2033

Google Chromium V8 Type Confusion Vulnerability

Google Chromium V8 contains a type confusion vulnerability. Specific impacts from exploitation are not available at this time.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-04-17

  • Due Date: 2023-05-08

Resources and Notes

APPLE | MACOS

CVE-2019-8526

Apple macOS Use-After-Free Vulnerability

Apple macOS contains a use-after-free vulnerability that could allow for privilege escalation.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-04-17

  • Due Date: 2023-05-08

Resources and Notes

NOVI SURVEY | NOVI SURVEY

CVE-2023-29492

Novi Survey Insecure Deserialization Vulnerability

Novi Survey contains an insecure deserialization vulnerability that allows remote attackers to execute code on the server in the context of the service account.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-04-13

  • Due Date: 2023-05-04

Resources and Notes

ANDROID | FRAMEWORK

CVE-2023-20963

Android Framework Privilege Escalation Vulnerability

Android Framework contains an unspecified vulnerability that allows for privilege escalation after updating an app to a higher Target SDK with no additional execution privileges needed.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-04-13

  • Due Date: 2023-05-04

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-28252

Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability

Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-04-11

  • Due Date: 2023-05-02

Resources and Notes

APPLE | IOS, IPADOS, AND MACOS

CVE-2023-28206

Apple iOS, iPadOS, and macOS IOSurfaceAccelerator Out-of-Bounds Write Vulnerability

Apple iOS, iPadOS, and macOS IOSurfaceAccelerator contain an out-of-bounds write vulnerability that allows an app to execute code with kernel privileges.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-04-10

  • Due Date: 2023-05-01

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-28205

Apple Multiple Products WebKit Use-After-Free Vulnerability

Apple iOS, iPadOS, macOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-04-10

  • Due Date: 2023-05-01

Resources and Notes

ARM | MALI GRAPHICS PROCESSING UNIT (GPU)

CVE-2023-26083

Arm Mali GPU Kernel Driver Information Disclosure Vulnerability

Arm Mali GPU Kernel Driver contains an information disclosure vulnerability that allows a non-privileged user to make valid GPU processing operations that expose sensitive kernel metadata.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-04-07

  • Due Date: 2023-04-28

Resources and Notes

MICROSOFT | WINDOWS

CVE-2019-1388

Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability

Microsoft Windows Certificate Dialog contains a privilege escalation vulnerability, allowing attackers to run processes in an elevated context.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-04-07

  • Due Date: 2023-04-28

Resources and Notes

VERITAS | BACKUP EXEC AGENT

CVE-2021-27878

Veritas Backup Exec Agent Command Execution Vulnerability

Veritas Backup Exec (BE) Agent contains a command execution vulnerability that could allow an attacker to use a data management protocol command to execute a command on the BE Agent machine.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-04-07

  • Due Date: 2023-04-28

Resources and Notes

VERITAS | BACKUP EXEC AGENT

CVE-2021-27877

Veritas Backup Exec Agent Improper Authentication Vulnerability

Veritas Backup Exec (BE) Agent contains an improper authentication vulnerability that could allow an attacker unauthorized access to the BE Agent via SHA authentication scheme.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-04-07

  • Due Date: 2023-04-28

Resources and Notes

VERITAS | BACKUP EXEC AGENT

CVE-2021-27876

Veritas Backup Exec Agent File Access Vulnerability

Veritas Backup Exec (BE) Agent contains a file access vulnerability that could allow an attacker to specially craft input parameters on a data management protocol command to access files on the BE Agent machine.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-04-07

  • Due Date: 2023-04-28

Resources and Notes

ZIMBRA | COLLABORATION (ZCS)

CVE-2022-27926

Zimbra Collaboration (ZCS) Cross-Site Scripting (XSS) Vulnerability

Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability by allowing an endpoint URL to accept parameters without sanitizing.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-04-03

  • Due Date: 2023-04-24

Resources and Notes

ARM | MALI GRAPHICS PROCESSING UNIT (GPU)

CVE-2022-22706

Arm Mali GPU Kernel Driver Unspecified Vulnerability

Arm Mali GPU Kernel Driver contains an unspecified vulnerability that allows a non-privileged user to achieve write access to read-only memory pages.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-30

  • Due Date: 2023-04-20

Resources and Notes

GOOGLE | CHROME

CVE-2022-3038

Google Chrome Use-After-Free Vulnerability

Google Chrome contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-30

  • Due Date: 2023-04-20

Resources and Notes

LINUX | KERNEL

CVE-2023-0266

Linux Kernel Use-After-Free Vulnerability

Linux kernel contains a use-after-free vulnerability that allows for privilege escalation to gain ring0 access from the system user.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-30

  • Due Date: 2023-04-20

Resources and Notes

ARM | MALI GRAPHICS PROCESSING UNIT (GPU)

CVE-2022-38181

Arm Mali GPU Kernel Driver Use-After-Free Vulnerability

Arm Mali GPU Kernel Driver contains a use-after-free vulnerability that may allow a non-privileged user to gain root privilege and/or disclose information.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-30

  • Due Date: 2023-04-20

Resources and Notes

APPLE | IOS, IPADOS, AND MACOS

CVE-2021-30900

Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability

Apple GPU drivers, included in iOS, iPadOS, and macOS, contain an out-of-bounds write vulnerability that may allow a malicious application to execute code with kernel privileges.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-30

  • Due Date: 2023-04-20

Resources and Notes

FORTRA | COBALT STRIKE

CVE-2022-39197

Fortra Cobalt Strike Teamserver Cross-Site Scripting (XSS) Vulnerability

Fortra Cobalt Strike contains a cross-site scripting (XSS) vulnerability in Teamserver that would allow an attacker to set a malformed username in the Beacon configuration, allowing them to execute code remotely.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-30

  • Due Date: 2023-04-20

Resources and Notes

FORTRA | COBALT STRIKE

CVE-2022-42948

Fortra Cobalt Strike User Interface Remote Code Execution Vulnerability

Fortra Cobalt Strike User Interface contains an unspecified vulnerability rooted in Java Swing that may allow remote code execution.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-30

  • Due Date: 2023-04-20

Resources and Notes

SAMBA | SAMBA

CVE-2017-7494

Samba Remote Code Execution Vulnerability

Samba contains a remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share and then cause the server to load and execute it.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-03-30

  • Due Date: 2023-04-20

Resources and Notes

MICROSOFT | INTERNET EXPLORER

CVE-2013-3163

Microsoft Internet Explorer Memory Corruption Vulnerability

Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause a denial of service via a crafted website.

  • Action: The impacted product is end-of-life and should be disconnected if still in use.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-30

  • Due Date: 2023-04-20

Resources and Notes

ADOBE | COLDFUSION

CVE-2023-26360

Adobe ColdFusion Deserialization of Untrusted Data Vulnerability

Adobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for remote code execution.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-15

  • Due Date: 2023-04-05

Resources and Notes

FORTINET | FORTIOS

CVE-2022-41328

Fortinet FortiOS Path Traversal Vulnerability

Fortinet FortiOS contains a path traversal vulnerability that may allow a local privileged attacker to read and write files via crafted CLI commands.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-14

  • Due Date: 2023-04-04

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-24880

Microsoft Windows SmartScreen Security Feature Bypass Vulnerability

Microsoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-03-14

  • Due Date: 2023-04-04

Resources and Notes

MICROSOFT | OFFICE

CVE-2023-23397

Microsoft Office Outlook Privilege Escalation Vulnerability

Microsoft Office Outlook contains a privilege escalation vulnerability that allows for a NTLM Relay attack against another service to authenticate as the user.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-14

  • Due Date: 2023-04-04

Resources and Notes

PLEX | MEDIA SERVER

CVE-2020-5741

Plex Media Server Remote Code Execution Vulnerability

Plex Media Server contains a remote code execution vulnerability that allows an attacker with access to the server administrator's Plex account to upload a malicious file via the Camera Upload feature and have the media server execute it.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-10

  • Due Date: 2023-03-31

Resources and Notes

XSTREAM | XSTREAM

CVE-2021-39144

XStream Remote Code Execution Vulnerability

XStream contains a remote code execution vulnerability that allows an attacker to manipulate the processed input stream and replace or inject objects that result in the execution of a local command on the server. This vulnerability can affect multiple products, including but not limited to VMware Cloud Foundation.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-10

  • Due Date: 2023-03-31

Resources and Notes

TECLIB | GLPI

CVE-2022-35914

Teclib GLPI Remote Code Execution Vulnerability

Teclib GLPI contains a remote code execution vulnerability in the third-party library, htmlawed.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-07

  • Due Date: 2023-03-28

Resources and Notes

APACHE | SPARK

CVE-2022-33891

Apache Spark Command Injection Vulnerability

Apache Spark contains a command injection vulnerability via Spark User Interface (UI) when Access Control Lists (ACLs) are enabled.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-07

  • Due Date: 2023-03-28

Resources and Notes

ZOHO | MANAGEENGINE

CVE-2022-28810

Zoho ManageEngine ADSelfService Plus Remote Code Execution Vulnerability

Zoho ManageEngine ADSelfService Plus contains an unspecified vulnerability allowing for remote code execution when performing a password change or reset.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-03-07

  • Due Date: 2023-03-28

Resources and Notes

ZK FRAMEWORK | AUUPLOADER

CVE-2022-36537

ZK Framework AuUploader Unspecified Vulnerability

ZK Framework AuUploader servlets contain an unspecified vulnerability that could allow an attacker to retrieve the content of a file located in the web context. The ZK Framework is an open-source Java framework. This vulnerability can impact multiple products, including but not limited to ConnectWise R1Soft Server Backup Manager.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-02-27

  • Due Date: 2023-03-20

Resources and Notes

MITEL | MIVOICE CONNECT

CVE-2022-40765

Mitel MiVoice Connect Command Injection Vulnerability

The Mitel Edge Gateway component of MiVoice Connect allows an authenticated attacker with internal network access to execute commands within the context of the system.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-02-21

  • Due Date: 2023-03-14

Resources and Notes

MITEL | MIVOICE CONNECT

CVE-2022-41223

Mitel MiVoice Connect Code Injection Vulnerability

The Director component in Mitel MiVoice Connect allows an authenticated attacker with internal network access to execute code within the context of the application.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-02-21

  • Due Date: 2023-03-14

Resources and Notes

IBM | ASPERA FASPEX

CVE-2022-47986

IBM Aspera Faspex Code Execution Vulnerability

IBM Aspera Faspex could allow a remote attacker to execute code on the system, caused by a YAML deserialization flaw.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-02-21

  • Due Date: 2023-03-14

Resources and Notes

CACTI | CACTI

CVE-2022-46169

Cacti Command Injection Vulnerability

Cacti contains a command injection vulnerability that allows an unauthenticated user to execute code.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-02-16

  • Due Date: 2023-03-09

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-21823

Microsoft Windows Graphic Component Privilege Escalation Vulnerability

Microsoft Windows Graphic Component contains an unspecified vulnerability that allows for privilege escalation.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-02-14

  • Due Date: 2023-03-07

Resources and Notes

APPLE | MULTIPLE PRODUCTS

CVE-2023-23529

Apple Multiple Products WebKit Type Confusion Vulnerability

WebKit in Apple iOS, MacOS, Safari and iPadOS contains a type confusion vulnerability that may lead to code execution.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-02-14

  • Due Date: 2023-03-07

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-23376

Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability

Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-02-14

  • Due Date: 2023-03-07

Resources and Notes

MICROSOFT | OFFICE

CVE-2023-21715

Microsoft Office Publisher Security Feature Bypass Vulnerability

Microsoft Office Publisher contains a security feature bypass vulnerability that allows for a local, authenticated attack on a targeted system.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-02-14

  • Due Date: 2023-03-07

Resources and Notes

FORTRA | GOANYWHERE MFT

CVE-2023-0669

Fortra GoAnywhere MFT Remote Code Execution Vulnerability

Fortra (formerly, HelpSystems) GoAnywhere MFT contains a pre-authentication remote code execution vulnerability in the License Response Servlet due to deserializing an attacker-controlled object.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-02-10

  • Due Date: 2023-03-03

Resources and Notes

TERRAMASTER | TERRAMASTER OS

CVE-2022-24990

TerraMaster OS Remote Command Execution Vulnerability

TerraMaster OS contains a remote command execution vulnerability that allows an unauthenticated user to execute commands on the target endpoint.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-02-10

  • Due Date: 2023-03-03

Resources and Notes

INTEL | ETHERNET DIAGNOSTICS DRIVER FOR WINDOWS

CVE-2015-2291

Intel Ethernet Diagnostics Driver for Windows Denial-of-Service Vulnerability

Intel ethernet diagnostics driver for Windows IQVW32.sys and IQVW64.sys contain an unspecified vulnerability that allows for a denial-of-service (DoS).

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-02-10

  • Due Date: 2023-03-03

Resources and Notes

SUGARCRM | MULTIPLE PRODUCTS

CVE-2023-22952

Multiple SugarCRM Products Remote Code Execution Vulnerability

Multiple SugarCRM products contain a remote code execution vulnerability in the EmailTemplates. Using a specially crafted request, custom PHP code can be injected through the EmailTemplates.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-02-02

  • Due Date: 2023-02-23

Resources and Notes

ORACLE | E-BUSINESS SUITE

CVE-2022-21587

Oracle E-Business Suite Unspecified Vulnerability

Oracle E-Business Suite contains an unspecified vulnerability that allows an unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-02-02

  • Due Date: 2023-02-23

Resources and Notes

TELERIK | USER INTERFACE (UI) FOR ASP.NET AJAX

CVE-2017-11357

Telerik UI for ASP.NET AJAX Insecure Direct Object Reference Vulnerability

Telerik UI for ASP.NET AJAX contains an insecure direct object reference vulnerability in RadAsyncUpload that can result in file uploads in a limited location and/or remote code execution.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-01-26

  • Due Date: 2023-02-16

Resources and Notes

ZOHO | MANAGEENGINE

CVE-2022-47966

Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability

Multiple Zoho ManageEngine products contain an unauthenticated remote code execution vulnerability due to the usage of an outdated third-party dependency, Apache Santuario.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-01-23

  • Due Date: 2023-02-13

Resources and Notes

CWP | CONTROL WEB PANEL

CVE-2022-44877

CWP Control Web Panel OS Command Injection Vulnerability

CWP Control Web Panel (formerly CentOS Web Panel) contains an OS command injection vulnerability that allows remote attackers to execute commands via shell metacharacters in the login parameter.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-01-17

  • Due Date: 2023-02-07

Resources and Notes

MICROSOFT | WINDOWS

CVE-2023-21674

Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability

Microsoft Windows Advanced Local Procedure Call (ALPC) contains an unspecified vulnerability that allows for privilege escalation.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Unknown

  • Date Added: 2023-01-10

  • Due Date: 2023-01-31

Resources and Notes

MICROSOFT | EXCHANGE SERVER

CVE-2022-41080

Microsoft Exchange Server Privilege Escalation Vulnerability

Microsoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation. This vulnerability is chainable with CVE-2022-41082, which allows for remote code execution.

  • Action: Apply updates per vendor instructions.

  • Known To Be Used in Ransomware Campaigns?: Known

  • Date Added: 2023-01-10

  • Due Date: 2023-01-31