|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.03.03", |
4 | | - "dateReleased": "2025-03-03T19:46:59.7703Z", |
5 | | - "count": 1285, |
| 3 | + "catalogVersion": "2025.03.04", |
| 4 | + "dateReleased": "2025-03-04T17:21:24.6205Z", |
| 5 | + "count": 1289, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2025-22226", |
| 9 | + "vendorProject": "VMware", |
| 10 | + "product": "ESXi, Workstation, and Fusion", |
| 11 | + "vulnerabilityName": "VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability", |
| 12 | + "dateAdded": "2025-03-04", |
| 13 | + "shortDescription": "VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. Successful exploitation allows an attacker with administrative privileges to a virtual machine to leak memory from the vmx process.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-03-25", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/25390 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-22226", |
| 18 | + "cwes": [ |
| 19 | + "CWE-125" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2025-22225", |
| 24 | + "vendorProject": "VMware", |
| 25 | + "product": "ESXi", |
| 26 | + "vulnerabilityName": "VMware ESXi Arbitrary Write Vulnerability", |
| 27 | + "dateAdded": "2025-03-04", |
| 28 | + "shortDescription": "VMware ESXi contains an arbitrary write vulnerability. Successful exploitation allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write leading to an escape of the sandbox.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-03-25", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/25390 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-22225", |
| 33 | + "cwes": [ |
| 34 | + "CWE-123" |
| 35 | + ] |
| 36 | + }, |
| 37 | + { |
| 38 | + "cveID": "CVE-2025-22224", |
| 39 | + "vendorProject": "VMware", |
| 40 | + "product": "ESXi and Workstation", |
| 41 | + "vulnerabilityName": "VMware ESXi and Workstation TOCTOU Race Condition Vulnerability", |
| 42 | + "dateAdded": "2025-03-04", |
| 43 | + "shortDescription": "VMware ESXi and Workstation contain a time-of-check time-of-use (TOCTOU) race condition vulnerability that leads to an out-of-bounds write. Successful exploitation enables an attacker with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host.", |
| 44 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 45 | + "dueDate": "2025-03-25", |
| 46 | + "knownRansomwareCampaignUse": "Unknown", |
| 47 | + "notes": "https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/25390 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-22224", |
| 48 | + "cwes": [ |
| 49 | + "CWE-367" |
| 50 | + ] |
| 51 | + }, |
| 52 | + { |
| 53 | + "cveID": "CVE-2024-50302", |
| 54 | + "vendorProject": "Linux", |
| 55 | + "product": "Kernel", |
| 56 | + "vulnerabilityName": "Linux Kernel Use of Uninitialized Resource Vulnerability", |
| 57 | + "dateAdded": "2025-03-04", |
| 58 | + "shortDescription": "The Linux kernel contains a use of uninitialized resource vulnerability that allows an attacker to leak kernel memory via a specially crafted HID report.", |
| 59 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 60 | + "dueDate": "2025-03-25", |
| 61 | + "knownRansomwareCampaignUse": "Unknown", |
| 62 | + "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/lore.kernel.org\/linux-cve-announce\/2024111908-CVE-2024-50302-f677@gregkh\/ ; https:\/\/source.android.com\/docs\/security\/bulletin\/2025-03-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-50302", |
| 63 | + "cwes": [ |
| 64 | + "CWE-908" |
| 65 | + ] |
| 66 | + }, |
7 | 67 | { |
8 | 68 | "cveID": "CVE-2024-4885", |
9 | 69 | "vendorProject": "Progress", |
|
0 commit comments