|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.03.11", |
4 | | - "dateReleased": "2025-03-11T17:10:05.6457Z", |
5 | | - "count": 1300, |
| 3 | + "catalogVersion": "2025.03.13", |
| 4 | + "dateReleased": "2025-03-13T19:37:52.2229Z", |
| 5 | + "count": 1302, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2025-21590", |
| 9 | + "vendorProject": "Juniper", |
| 10 | + "product": "Junos OS", |
| 11 | + "vulnerabilityName": "Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability", |
| 12 | + "dateAdded": "2025-03-13", |
| 13 | + "shortDescription": "Juniper Junos OS contains an improper isolation or compartmentalization vulnerability. This vulnerability could allows a local attacker with high privileges to inject arbitrary code.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-04-03", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "https:\/\/supportportal.juniper.net\/s\/article\/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21590", |
| 18 | + "cwes": [ |
| 19 | + "CWE-653" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2025-24201", |
| 24 | + "vendorProject": "Apple", |
| 25 | + "product": "Multiple Products", |
| 26 | + "vulnerabilityName": "Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability", |
| 27 | + "dateAdded": "2025-03-13", |
| 28 | + "shortDescription": "Apple iOS, iPadOS, macOS, and other Apple products contain an out-of-bounds write vulnerability in WebKit that may allow maliciously crafted web content to break out of Web Content sandbox. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-04-03", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/support.apple.com\/en-us\/122281 ; https:\/\/support.apple.com\/en-us\/122283 ; https:\/\/support.apple.com\/en-us\/122284 ; https:\/\/support.apple.com\/en-us\/122285 ; ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24201", |
| 33 | + "cwes": [ |
| 34 | + "CWE-787" |
| 35 | + ] |
| 36 | + }, |
7 | 37 | { |
8 | 38 | "cveID": "CVE-2025-24993", |
9 | 39 | "vendorProject": "Microsoft", |
10 | 40 | "product": "Windows", |
11 | 41 | "vulnerabilityName": "Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability", |
12 | 42 | "dateAdded": "2025-03-11", |
13 | | - "shortDescription": "Microsoft Windows New Technology File System (NTFS) contains a heap-based buffer overflow vulnerability that could allow an authorized attacker to execute code locally.", |
| 43 | + "shortDescription": "Microsoft Windows New Technology File System (NTFS) contains a heap-based buffer overflow vulnerability that allows an unauthorized attacker to execute code locally.", |
14 | 44 | "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
15 | 45 | "dueDate": "2025-04-01", |
16 | 46 | "knownRansomwareCampaignUse": "Unknown", |
|
25 | 55 | "product": "Windows", |
26 | 56 | "vulnerabilityName": "Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability", |
27 | 57 | "dateAdded": "2025-03-11", |
28 | | - "shortDescription": "Microsoft Windows New Technology File System (NTFS) contains an out-of-bounds read vulnerability that could allow for information disclosure.", |
| 58 | + "shortDescription": "Microsoft Windows New Technology File System (NTFS) contains an out-of-bounds read vulnerability that allows an authorized attacker to disclose information locally.", |
29 | 59 | "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
30 | 60 | "dueDate": "2025-04-01", |
31 | 61 | "knownRansomwareCampaignUse": "Unknown", |
|
40 | 70 | "product": "Windows", |
41 | 71 | "vulnerabilityName": "Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability", |
42 | 72 | "dateAdded": "2025-03-11", |
43 | | - "shortDescription": "Microsoft Windows Fast FAT File System Driver contains an integer overflow or wraparound vulnerability that allows an unauthorized attacker to execute code with a physical attack.", |
| 73 | + "shortDescription": "Microsoft Windows Fast FAT File System Driver contains an integer overflow or wraparound vulnerability that allows an unauthorized attacker to execute code locally.", |
44 | 74 | "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
45 | 75 | "dueDate": "2025-04-01", |
46 | 76 | "knownRansomwareCampaignUse": "Unknown", |
47 | 77 | "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24985 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24985", |
48 | 78 | "cwes": [ |
49 | | - "CWE-190" |
| 79 | + "CWE-190", |
| 80 | + "CWE-122" |
50 | 81 | ] |
51 | 82 | }, |
52 | 83 | { |
|
55 | 86 | "product": "Windows", |
56 | 87 | "vulnerabilityName": "Microsoft Windows NTFS Information Disclosure Vulnerability", |
57 | 88 | "dateAdded": "2025-03-11", |
58 | | - "shortDescription": "Microsoft Windows New Technology File System (NTFS) contains an insertion of sensitive Information into log file vulnerability that allows an authorized attacker to disclose information locally. An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.", |
| 89 | + "shortDescription": "Microsoft Windows New Technology File System (NTFS) contains an insertion of sensitive Information into log file vulnerability that allows an unauthorized attacker to disclose information with a physical attack. An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.", |
59 | 90 | "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
60 | 91 | "dueDate": "2025-04-01", |
61 | 92 | "knownRansomwareCampaignUse": "Unknown", |
|
85 | 116 | "product": "Windows", |
86 | 117 | "vulnerabilityName": "Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability", |
87 | 118 | "dateAdded": "2025-03-11", |
88 | | - "shortDescription": "Microsoft Windows Management Console (MMC) contains an improper neutralization vulnerability that allows an unauthorized attacker to execute code over a network.", |
| 119 | + "shortDescription": "Microsoft Windows Management Console (MMC) contains an improper neutralization vulnerability that allows an unauthorized attacker to bypass a security feature locally.", |
89 | 120 | "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
90 | 121 | "dueDate": "2025-04-01", |
91 | 122 | "knownRansomwareCampaignUse": "Unknown", |
|
0 commit comments