|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.02.07", |
4 | | - "dateReleased": "2025-02-07T18:02:47.8302Z", |
5 | | - "count": 1264, |
| 3 | + "catalogVersion": "2025.02.11", |
| 4 | + "dateReleased": "2025-02-11T19:20:49.4567Z", |
| 5 | + "count": 1268, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2024-40891", |
| 9 | + "vendorProject": "Zyxel", |
| 10 | + "product": "DSL CPE Devices", |
| 11 | + "vulnerabilityName": "Zyxel DSL CPE OS Command Injection Vulnerability", |
| 12 | + "dateAdded": "2025-02-11", |
| 13 | + "shortDescription": "Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authenticated attacker to execute OS commands via Telnet.", |
| 14 | + "requiredAction": "The impacted product could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.", |
| 15 | + "dueDate": "2025-03-04", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/www.zyxel.com\/global\/en\/support\/security-advisories\/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https:\/\/www.zyxel.com\/service-provider\/global\/en\/security-advisories\/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-40891", |
| 18 | + "cwes": [ |
| 19 | + "CWE-78" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2024-40890", |
| 24 | + "vendorProject": "Zyxel", |
| 25 | + "product": "DSL CPE Devices", |
| 26 | + "vulnerabilityName": "Zyxel DSL CPE OS Command Injection Vulnerability", |
| 27 | + "dateAdded": "2025-02-11", |
| 28 | + "shortDescription": "Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the CGI program that could allow an authenticated attacker to execute OS commands via a crafted HTTP request.", |
| 29 | + "requiredAction": "The impacted product could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.", |
| 30 | + "dueDate": "2025-03-04", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/www.zyxel.com\/global\/en\/support\/security-advisories\/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https:\/\/www.zyxel.com\/service-provider\/global\/en\/security-advisories\/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-40890", |
| 33 | + "cwes": [ |
| 34 | + "CWE-78" |
| 35 | + ] |
| 36 | + }, |
| 37 | + { |
| 38 | + "cveID": "CVE-2025-21418", |
| 39 | + "vendorProject": "Microsoft", |
| 40 | + "product": "Windows", |
| 41 | + "vulnerabilityName": "Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability", |
| 42 | + "dateAdded": "2025-02-11", |
| 43 | + "shortDescription": "Microsoft Windows Ancillary Function Driver for WinSock contains a heap-based buffer overflow vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.", |
| 44 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 45 | + "dueDate": "2025-03-04", |
| 46 | + "knownRansomwareCampaignUse": "Unknown", |
| 47 | + "notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21418 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21418", |
| 48 | + "cwes": [ |
| 49 | + "CWE-122" |
| 50 | + ] |
| 51 | + }, |
| 52 | + { |
| 53 | + "cveID": "CVE-2025-21391", |
| 54 | + "vendorProject": "Microsoft", |
| 55 | + "product": "Windows", |
| 56 | + "vulnerabilityName": "Microsoft Windows Storage Link Following Vulnerability", |
| 57 | + "dateAdded": "2025-02-11", |
| 58 | + "shortDescription": "Microsoft Windows Storage contains a link following vulnerability that could allow for privilege escalation. This vulnerability could allow an attacker to delete data including data that results in the service being unavailable.", |
| 59 | + "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
| 60 | + "dueDate": "2025-03-04", |
| 61 | + "knownRansomwareCampaignUse": "Unknown", |
| 62 | + "notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21391 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21391", |
| 63 | + "cwes": [ |
| 64 | + "CWE-59" |
| 65 | + ] |
| 66 | + }, |
7 | 67 | { |
8 | 68 | "cveID": "CVE-2025-0994", |
9 | 69 | "vendorProject": "Trimble", |
|
0 commit comments