Skip to content

Commit

Permalink
CISA KEV Updates
Browse files Browse the repository at this point in the history
  • Loading branch information
rxerium committed Jan 23, 2025
1 parent aa8136f commit de58946
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion cisa-kev.csv
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ CVE-2024-50603,Aviatrix,Controllers,"Aviatrix Controllers OS Command Injection V
CVE-2025-21335,Microsoft,Windows,"Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability",2025-01-14,"Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-04,Unknown,"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21335 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21335",CWE-416
CVE-2025-21334,Microsoft,Windows,"Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability",2025-01-14,"Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-04,Unknown,"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21334 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21334",CWE-416
CVE-2025-21333,Microsoft,Windows,"Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability",2025-01-14,"Microsoft Windows Hyper-V NT Kernel Integration VSP contains a heap-based buffer overflow vulnerability that allows a local attacker to gain SYSTEM privileges.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-04,Unknown,"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21333 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21333",CWE-122
CVE-2024-55591,Fortinet,FortiOS,"Fortinet FortiOS Authorization Bypass Vulnerability",2025-01-14,"Fortinet FortiOS contains an authorization bypass vulnerability that may allow an unauthenticated remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-21,Unknown,"https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55591",CWE-288
CVE-2024-55591,Fortinet,"FortiOS and FortiProxy","Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability",2025-01-14,"Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that may allow an unauthenticated, remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-01-21,Unknown,"https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55591",CWE-288
CVE-2023-48365,Qlik,Sense,"Qlik Sense HTTP Tunneling Vulnerability",2025-01-13,"Qlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-03,Unknown,"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/tac-p/2120510 ; https://nvd.nist.gov/vuln/detail/CVE-2023-48365",CWE-444
CVE-2024-12686,BeyondTrust,"Privileged Remote Access (PRA) and Remote Support (RS)","BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability",2025-01-13,"BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) contain an OS command injection vulnerability that can be exploited by an attacker with existing administrative privileges to upload a malicious file. Successful exploitation of this vulnerability can allow a remote attacker to execute underlying operating system commands within the context of the site user.","Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",2025-02-03,Unknown,"https://www.beyondtrust.com/trust-center/security-advisories/bt24-11 ; https://nvd.nist.gov/vuln/detail/CVE-2024-12686",CWE-78
CVE-2025-0282,Ivanti,"Connect Secure, Policy Secure, and ZTA Gateways","Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability",2025-01-08,"Ivanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow which can lead to unauthenticated remote code execution.","Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service.",2025-01-15,Unknown,"CISA Mitigation Instructions: https://www.cisa.gov/cisa-mitigation-instructions-CVE-2025-0282 Additional References: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0282",CWE-121
Expand Down
2 changes: 1 addition & 1 deletion nuclei-templates
Submodule nuclei-templates updated from ef90d4 to d2f170

0 comments on commit de58946

Please sign in to comment.