Skip to content

Commit 855fe53

Browse files
Update KEV: Tue Apr 22 00:12:41 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 5b76222 commit 855fe53

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

known_exploited_vulnerabilities.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.04.17",
4-
"dateReleased": "2025-04-17T17:01:44.4538Z",
3+
"catalogVersion": "2025.04.21",
4+
"dateReleased": "2025-04-21T17:28:48.0783Z",
55
"count": 1323,
66
"vulnerabilities": [
77
{
@@ -109,13 +109,13 @@
109109
"cveID": "CVE-2025-30406",
110110
"vendorProject": "Gladinet",
111111
"product": "CentreStack",
112-
"vulnerabilityName": "Gladinet CentreStack Use of Hard-coded Cryptographic Key Vulnerability",
112+
"vulnerabilityName": "Gladinet CentreStack and Triofox Use of Hard-coded Cryptographic Key Vulnerability",
113113
"dateAdded": "2025-04-08",
114-
"shortDescription": "Gladinet CentreStack contains a use of hard-coded cryptographic key vulnerability in the way that the application manages keys used for ViewState integrity verification. Successful exploitation allows an attacker to forge ViewState payloads for server-side deserialization, allowing for remote code execution.",
114+
"shortDescription": "Gladinet CentreStack and Triofox contains a use of hard-coded cryptographic key vulnerability in the way that the application manages keys used for ViewState integrity verification. Successful exploitation allows an attacker to forge ViewState payloads for server-side deserialization, allowing for remote code execution.",
115115
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
116116
"dueDate": "2025-04-29",
117117
"knownRansomwareCampaignUse": "Unknown",
118-
"notes": "https:\/\/gladinetsupport.s3.us-east-1.amazonaws.com\/gladinet\/securityadvisory-cve-2005.pdf ; https:\/\/www.centrestack.com\/p\/gce_latest_release.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30406",
118+
"notes": "https:\/\/gladinetsupport.s3.us-east-1.amazonaws.com\/gladinet\/securityadvisory-cve-2005.pdf ; https:\/\/gladinetsupport.s3.us-east-1.amazonaws.com\/gladinet\/securityadvisory-cve-2025-triofox.pdf ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30406",
119119
"cwes": [
120120
"CWE-321"
121121
]

0 commit comments

Comments
 (0)