Skip to content

Commit d821bf9

Browse files
Update KEV: Tue Aug 26 00:12:51 UTC 2025
Signed-off-by: AboutCode Automation <[email protected]>
1 parent 4a060b8 commit d821bf9

File tree

1 file changed

+49
-3
lines changed

1 file changed

+49
-3
lines changed

known_exploited_vulnerabilities.json

Lines changed: 49 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,55 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2025.08.21",
4-
"dateReleased": "2025-08-21T17:02:19.8046Z",
5-
"count": 1401,
3+
"catalogVersion": "2025.08.25",
4+
"dateReleased": "2025-08-25T17:04:19.9796Z",
5+
"count": 1404,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2025-48384",
9+
"vendorProject": "Git",
10+
"product": "Git",
11+
"vulnerabilityName": "Git Link Following Vulnerability",
12+
"dateAdded": "2025-08-25",
13+
"shortDescription": "Git contains a link following vulnerability that stems from Git\u2019s inconsistent handling of carriage return characters in configuration files.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2025-09-15",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/github.com\/git\/git\/security\/advisories\/GHSA-vwqx-4fm8-6qc9 ; https:\/\/access.redhat.com\/errata\/RHSA-2025:13933 ; https:\/\/alas.aws.amazon.com\/AL2\/ALAS2-2025-2941.html ; https:\/\/linux.oracle.com\/errata\/ELSA-2025-11534.html ; https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-48384 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48384",
18+
"cwes": [
19+
"CWE-59",
20+
"CWE-436"
21+
]
22+
},
23+
{
24+
"cveID": "CVE-2024-8068",
25+
"vendorProject": "Citrix",
26+
"product": "Session Recording",
27+
"vulnerabilityName": "Citrix Session Recording Improper Privilege Management Vulnerability",
28+
"dateAdded": "2025-08-25",
29+
"shortDescription": "Citrix Session Recording contains an improper privilege management vulnerability that could allow for privilege escalation to NetworkService Account access. An attacker must be an authenticated user in the same Windows Active Directory domain as the session recording server domain.",
30+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
31+
"dueDate": "2025-09-15",
32+
"knownRansomwareCampaignUse": "Unknown",
33+
"notes": "https:\/\/support.citrix.com\/external\/article\/691941\/citrix-session-recording-security-bullet.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-8068",
34+
"cwes": [
35+
"CWE-269"
36+
]
37+
},
38+
{
39+
"cveID": "CVE-2024-8069",
40+
"vendorProject": "Citrix",
41+
"product": "Session Recording",
42+
"vulnerabilityName": "Citrix Session Recording Deserialization of Untrusted Data Vulnerability",
43+
"dateAdded": "2025-08-25",
44+
"shortDescription": "Citrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server.",
45+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
46+
"dueDate": "2025-09-15",
47+
"knownRansomwareCampaignUse": "Unknown",
48+
"notes": "https:\/\/support.citrix.com\/external\/article\/691941\/citrix-session-recording-security-bullet.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-8069",
49+
"cwes": [
50+
"CWE-502"
51+
]
52+
},
753
{
854
"cveID": "CVE-2025-43300",
955
"vendorProject": "Apple",

0 commit comments

Comments
 (0)