|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.06.13", |
4 | | - "dateReleased": "2025-06-13T16:08:40.4237Z", |
5 | | - "count": 1364, |
| 3 | + "catalogVersion": "2025.06.16", |
| 4 | + "dateReleased": "2025-06-16T17:34:23.4151Z", |
| 5 | + "count": 1366, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2023-33538", |
| 9 | + "vendorProject": "TP-Link", |
| 10 | + "product": "Multiple Routers", |
| 11 | + "vulnerabilityName": "TP-Link Multiple Routers Command Injection Vulnerability", |
| 12 | + "dateAdded": "2025-06-16", |
| 13 | + "shortDescription": "TP-Link TL-WR940N V2\/V4, TL-WR841N V8\/V10, and TL-WR740N V1\/V2 contain a command injection vulnerability via the component \/userRpm\/WlanNetworkRpm. The impacted products could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-07-07", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/www.tp-link.com\/nordic\/support\/faq\/3562\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-33538", |
| 18 | + "cwes": [ |
| 19 | + "CWE-77" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2025-43200", |
| 24 | + "vendorProject": "Apple", |
| 25 | + "product": "Multiple Products", |
| 26 | + "vulnerabilityName": "Apple Multiple Products Unspecified Vulnerability", |
| 27 | + "dateAdded": "2025-06-16", |
| 28 | + "shortDescription": "Apple iOS, iPadOS, macOS, watchOS, and visionOS, contain an unspecified vulnerability when processing a maliciously crafted photo or video shared via an iCloud Link.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-07-07", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/support.apple.com\/en-us\/122174 ; https:\/\/support.apple.com\/en-us\/122173 ; https:\/\/support.apple.com\/en-us\/122900 ; https:\/\/support.apple.com\/en-us\/122901 ; https:\/\/support.apple.com\/en-us\/122902 ; https:\/\/support.apple.com\/en-us\/122903 ; https:\/\/support.apple.com\/en-us\/122904 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-43200", |
| 33 | + "cwes": [] |
| 34 | + }, |
7 | 35 | { |
8 | 36 | "cveID": "CVE-2025-33053", |
9 | 37 | "vendorProject": "Web Distributed Authoring and Versioning", |
|
29 | 57 | "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
30 | 58 | "dueDate": "2025-07-01", |
31 | 59 | "knownRansomwareCampaignUse": "Unknown", |
32 | | - "notes": "https:\/\/github.com\/wazuh\/wazuh\/security\/advisories\/GHSA-hcrc-79hj-m3qh ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24016", |
| 60 | + "notes": "https:\/\/wazuh.com\/blog\/addressing-the-cve-2025-24016-vulnerability\/ ; https:\/\/github.com\/wazuh\/wazuh\/security\/advisories\/GHSA-hcrc-79hj-m3qh ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24016", |
33 | 61 | "cwes": [ |
34 | 62 | "CWE-502" |
35 | 63 | ] |
|
0 commit comments