Skip to content

Commit 58e3120

Browse files
Update KEV: Wed Feb 12 00:11:12 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 1c509a3 commit 58e3120

File tree

1 file changed

+63
-3
lines changed

1 file changed

+63
-3
lines changed

known_exploited_vulnerabilities.json

Lines changed: 63 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,69 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.02.07",
4-
"dateReleased": "2025-02-07T18:02:47.8302Z",
5-
"count": 1264,
3+
"catalogVersion": "2025.02.11",
4+
"dateReleased": "2025-02-11T19:20:49.4567Z",
5+
"count": 1268,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2024-40891",
9+
"vendorProject": "Zyxel",
10+
"product": "DSL CPE Devices",
11+
"vulnerabilityName": "Zyxel DSL CPE OS Command Injection Vulnerability",
12+
"dateAdded": "2025-02-11",
13+
"shortDescription": "Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authenticated attacker to execute OS commands via Telnet.",
14+
"requiredAction": "The impacted product could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.",
15+
"dueDate": "2025-03-04",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/www.zyxel.com\/global\/en\/support\/security-advisories\/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https:\/\/www.zyxel.com\/service-provider\/global\/en\/security-advisories\/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-40891",
18+
"cwes": [
19+
"CWE-78"
20+
]
21+
},
22+
{
23+
"cveID": "CVE-2024-40890",
24+
"vendorProject": "Zyxel",
25+
"product": "DSL CPE Devices",
26+
"vulnerabilityName": "Zyxel DSL CPE OS Command Injection Vulnerability",
27+
"dateAdded": "2025-02-11",
28+
"shortDescription": "Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the CGI program that could allow an authenticated attacker to execute OS commands via a crafted HTTP request.",
29+
"requiredAction": "The impacted product could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.",
30+
"dueDate": "2025-03-04",
31+
"knownRansomwareCampaignUse": "Unknown",
32+
"notes": "https:\/\/www.zyxel.com\/global\/en\/support\/security-advisories\/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https:\/\/www.zyxel.com\/service-provider\/global\/en\/security-advisories\/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-40890",
33+
"cwes": [
34+
"CWE-78"
35+
]
36+
},
37+
{
38+
"cveID": "CVE-2025-21418",
39+
"vendorProject": "Microsoft",
40+
"product": "Windows",
41+
"vulnerabilityName": "Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability",
42+
"dateAdded": "2025-02-11",
43+
"shortDescription": "Microsoft Windows Ancillary Function Driver for WinSock contains a heap-based buffer overflow vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.",
44+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
45+
"dueDate": "2025-03-04",
46+
"knownRansomwareCampaignUse": "Unknown",
47+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21418 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21418",
48+
"cwes": [
49+
"CWE-122"
50+
]
51+
},
52+
{
53+
"cveID": "CVE-2025-21391",
54+
"vendorProject": "Microsoft",
55+
"product": "Windows",
56+
"vulnerabilityName": "Microsoft Windows Storage Link Following Vulnerability",
57+
"dateAdded": "2025-02-11",
58+
"shortDescription": "Microsoft Windows Storage contains a link following vulnerability that could allow for privilege escalation. This vulnerability could allow an attacker to delete data including data that results in the service being unavailable.",
59+
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
60+
"dueDate": "2025-03-04",
61+
"knownRansomwareCampaignUse": "Unknown",
62+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21391 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21391",
63+
"cwes": [
64+
"CWE-59"
65+
]
66+
},
767
{
868
"cveID": "CVE-2025-0994",
969
"vendorProject": "Trimble",

0 commit comments

Comments
 (0)