Skip to content

Commit 821a104

Browse files
author
rxerium
committed
CISA KEV Updates
1 parent ba92b94 commit 821a104

File tree

2 files changed

+3
-2
lines changed

2 files changed

+3
-2
lines changed

cisa-kev.csv

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
cveID,vendorProject,product,vulnerabilityName,dateAdded,shortDescription,requiredAction,dueDate,knownRansomwareCampaignUse,notes,cwes
2+
CVE-2024-12356,BeyondTrust,"Privileged Remote Access (PRA) and Remote Support (RS) ","BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability ",2024-12-19,"BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain a command injection vulnerability, which can allow an unauthenticated attacker to inject commands that are run as a site user. ","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2024-12-27,Unknown,"https://www.beyondtrust.com/trust-center/security-advisories/bt24-10 ; https://nvd.nist.gov/vuln/detail/CVE-2024-12356",CWE-77
23
CVE-2021-40407,Reolink,"RLC-410W IP Camera","Reolink RLC-410W IP Camera OS Command Injection Vulnerability ",2024-12-18,"Reolink RLC-410W IP cameras contain an authenticated OS command injection vulnerability in the device network settings functionality.","The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.",2025-01-08,Unknown,"https://reolink.com/product-eol/ ; https://reolink.com/download-center/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-40407",CWE-78
34
CVE-2019-11001,Reolink,"Multiple IP Cameras","Reolink Multiple IP Cameras OS Command Injection Vulnerability",2024-12-18,"Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W IP cameras contain an authenticated OS command injection vulnerability. This vulnerability allows an authenticated admin to use the ""TestEmail"" functionality to inject and run OS commands as root.","The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.",2025-01-08,Unknown,"https://reolink.com/product-eol/ ; https://reolink.com/download-center/ ; https://nvd.nist.gov/vuln/detail/CVE-2019-11001",CWE-78
45
CVE-2022-23227,NUUO,"NVRmini2 Devices","NUUO NVRmini 2 Devices Missing Authentication Vulnerability ",2024-12-18,"NUUO NVRmini 2 devices contain a missing authentication vulnerability that allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users. ","The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.",2025-01-08,Unknown,"https://nuuo.com/wp-content/uploads/2023/03/NUUO-EOL-letter_NVRmini-2-and-NVRsolo-series.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2022-23227",CWE-306
5-
CVE-2018-14933,NUUO,"NVRmini Devices","NUUO NVRmini Devices OS Command Injection Vulnerability ",2024-12-18,"NUUO NVRmini devices contain an OS command injection vulnerability. This vulnerability allows remote command execution via shell metacharacters in the uploaddir parameter for a writeuploaddir command.","The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.",2025-01-08,Unknown,"https://nuuo.com/wp-content/uploads/2023/03/NUUO-EOL-letter_NVRmini-2-and-NVRsolo-series.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2018-14933",CWE-78
6+
CVE-2018-14933,NUUO,"NVRmini Devices","NUUO NVRmini Devices OS Command Injection Vulnerability ",2024-12-18,"NUUO NVRmini devices contain an OS command injection vulnerability. This vulnerability allows remote command execution via shell metacharacters in the uploaddir parameter for a writeuploaddir command.","The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.",2025-01-08,Unknown,"https://nuuo.com/wp-content/uploads/2023/03/NUUO-EOL-letter%EF%BC%BFNVRmini-2-and-NVRsolo-series.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2018-14933",CWE-78
67
CVE-2024-55956,Cleo,"Multiple Products","Cleo Multiple Products Unauthenticated File Upload Vulnerability",2024-12-17,"Cleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload vulnerability that could allow an unauthenticated user to import and execute arbitrary bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-07,Known,"https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update-CVE-2024-55956 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55956",
78
CVE-2024-35250,Microsoft,Windows,"Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability ",2024-12-16,"Microsoft Windows Kernel-Mode Driver contains an untrusted pointer dereference vulnerability that allows a local attacker to escalate privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-06,Unknown,"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250 ; https://nvd.nist.gov/vuln/detail/CVE-2024-35250",CWE-822
89
CVE-2024-20767,Adobe,ColdFusion,"Adobe ColdFusion Improper Access Control Vulnerability",2024-12-16,"Adobe ColdFusion contains an improper access control vulnerability that could allow an attacker to access or modify restricted files via an internet-exposed admin panel.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-06,Unknown,"https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-20767",CWE-284

nuclei-templates

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
Subproject commit ac9a6be3e1ca7d77e020ae81e38ef80c278c46a7
1+
Subproject commit b2ce284be3021ab461db80571ff17ddc2bebd2df

0 commit comments

Comments
 (0)