|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.06.20", |
4 | | - "dateReleased": "2025-06-20T15:54:44.9005Z", |
5 | | - "count": 1367, |
| 3 | + "catalogVersion": "2025.06.25", |
| 4 | + "dateReleased": "2025-06-25T16:52:26.9744Z", |
| 5 | + "count": 1370, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2019-6693", |
| 9 | + "vendorProject": "Fortinet", |
| 10 | + "product": "FortiOS", |
| 11 | + "vulnerabilityName": "Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability", |
| 12 | + "dateAdded": "2025-06-25", |
| 13 | + "shortDescription": "Fortinet FortiOS contains a use of hard-coded credentials vulnerability that could allow an attacker to cipher sensitive data in FortiOS configuration backup file via knowledge of the hard-coded key. ", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-07-16", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/fortiguard.com\/advisory\/FG-IR-19-007 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-6693", |
| 18 | + "cwes": [ |
| 19 | + "CWE-798" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2024-0769", |
| 24 | + "vendorProject": "D-Link", |
| 25 | + "product": "DIR-859 Router", |
| 26 | + "vulnerabilityName": " D-Link DIR-859 Router Path Traversal Vulnerability", |
| 27 | + "dateAdded": "2025-06-25", |
| 28 | + "shortDescription": "D-Link DIR-859 routers contain a path traversal vulnerability in the file \/hedwig.cgi of the component HTTP POST Request Handler. Manipulation of the argument service with the input ..\/..\/..\/..\/htdocs\/webinc\/getcfg\/DHCPS6.BRIDGE-1.xml allows for the leakage of session data potentially enabling privilege escalation and unauthorized control of the device. This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-07-16", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/supportannouncement.us.dlink.com\/announcement\/publication.aspx?name=SAP10371 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-0769", |
| 33 | + "cwes": [ |
| 34 | + "CWE-22" |
| 35 | + ] |
| 36 | + }, |
| 37 | + { |
| 38 | + "cveID": "CVE-2024-54085", |
| 39 | + "vendorProject": "AMI", |
| 40 | + "product": "MegaRAC SPx", |
| 41 | + "vulnerabilityName": "AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability", |
| 42 | + "dateAdded": "2025-06-25", |
| 43 | + "shortDescription": "AMI MegaRAC SPx contains an authentication bypass by spoofing vulnerability in the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and\/or availability.", |
| 44 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 45 | + "dueDate": "2025-07-16", |
| 46 | + "knownRansomwareCampaignUse": "Unknown", |
| 47 | + "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https:\/\/go.ami.com\/hubfs\/Security%20Advisories\/2025\/AMI-SA-2025003.pdf ; https:\/\/security.netapp.com\/advisory\/ntap-20250328-0003\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54085", |
| 48 | + "cwes": [ |
| 49 | + "CWE-290" |
| 50 | + ] |
| 51 | + }, |
7 | 52 | { |
8 | 53 | "cveID": "CVE-2023-0386", |
9 | 54 | "vendorProject": "Linux", |
|
0 commit comments