|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.01.07", |
4 | | - "dateReleased": "2025-01-07T15:00:38.3276Z", |
5 | | - "count": 1242, |
| 3 | + "catalogVersion": "2025.01.08", |
| 4 | + "dateReleased": "2025-01-08T23:14:48.1212Z", |
| 5 | + "count": 1243, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2025-0282", |
| 9 | + "vendorProject": "Ivanti", |
| 10 | + "product": "Connect Secure, Policy Secure, and ZTA Gateways", |
| 11 | + "vulnerabilityName": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability", |
| 12 | + "dateAdded": "2025-01-08", |
| 13 | + "shortDescription": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow which can lead to unauthenticated remote code execution.", |
| 14 | + "requiredAction": "Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service.", |
| 15 | + "dueDate": "2025-01-15", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/cisa-mitigation-instructions-CVE-2025-0282 Additional References: https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-0282", |
| 18 | + "cwes": [ |
| 19 | + "CWE-121" |
| 20 | + ] |
| 21 | + }, |
7 | 22 | { |
8 | 23 | "cveID": "CVE-2020-2883", |
9 | 24 | "vendorProject": "Oracle", |
|
0 commit comments