Skip to content

Commit 7b4d5db

Browse files
Update KEV: Sat Jan 4 00:11:15 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent e5ca360 commit 7b4d5db

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

known_exploited_vulnerabilities.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.01.02",
4-
"dateReleased": "2025-01-02T14:21:28.9506Z",
3+
"catalogVersion": "2025.01.03",
4+
"dateReleased": "2025-01-03T20:16:50.6689Z",
55
"count": 1239,
66
"vulnerabilities": [
77
{
88
"cveID": "CVE-2024-3393",
99
"vendorProject": "Palo Alto Networks",
1010
"product": "PAN-OS",
11-
"vulnerabilityName": "Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability",
11+
"vulnerabilityName": "Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability",
1212
"dateAdded": "2024-12-30",
13-
"shortDescription": "Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malformed DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.",
13+
"shortDescription": "Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.",
1414
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
1515
"dueDate": "2025-01-20",
1616
"knownRansomwareCampaignUse": "Unknown",

0 commit comments

Comments
 (0)