Skip to content

Commit 468ea2b

Browse files
Update KEV: Thu Jan 23 00:11:07 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 1fafe5d commit 468ea2b

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

known_exploited_vulnerabilities.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.01.16",
4-
"dateReleased": "2025-01-16T15:00:56.7822Z",
3+
"catalogVersion": "2025.01.22",
4+
"dateReleased": "2025-01-22T19:49:22.4091Z",
55
"count": 1250,
66
"vulnerabilities": [
77
{
@@ -67,10 +67,10 @@
6767
{
6868
"cveID": "CVE-2024-55591",
6969
"vendorProject": "Fortinet",
70-
"product": "FortiOS",
71-
"vulnerabilityName": "Fortinet FortiOS Authorization Bypass Vulnerability",
70+
"product": "FortiOS and FortiProxy",
71+
"vulnerabilityName": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability",
7272
"dateAdded": "2025-01-14",
73-
"shortDescription": "Fortinet FortiOS contains an authorization bypass vulnerability that may allow an unauthenticated remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.",
73+
"shortDescription": "Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that may allow an unauthenticated, remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.",
7474
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
7575
"dueDate": "2025-01-21",
7676
"knownRansomwareCampaignUse": "Unknown",

0 commit comments

Comments
 (0)