|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.08.21", |
4 | | - "dateReleased": "2025-08-21T17:02:19.8046Z", |
5 | | - "count": 1401, |
| 3 | + "catalogVersion": "2025.08.25", |
| 4 | + "dateReleased": "2025-08-25T17:04:19.9796Z", |
| 5 | + "count": 1404, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2025-48384", |
| 9 | + "vendorProject": "Git", |
| 10 | + "product": "Git", |
| 11 | + "vulnerabilityName": "Git Link Following Vulnerability", |
| 12 | + "dateAdded": "2025-08-25", |
| 13 | + "shortDescription": "Git contains a link following vulnerability that stems from Git\u2019s inconsistent handling of carriage return characters in configuration files.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-09-15", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/github.com\/git\/git\/security\/advisories\/GHSA-vwqx-4fm8-6qc9 ; https:\/\/access.redhat.com\/errata\/RHSA-2025:13933 ; https:\/\/alas.aws.amazon.com\/AL2\/ALAS2-2025-2941.html ; https:\/\/linux.oracle.com\/errata\/ELSA-2025-11534.html ; https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-48384 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48384", |
| 18 | + "cwes": [ |
| 19 | + "CWE-59", |
| 20 | + "CWE-436" |
| 21 | + ] |
| 22 | + }, |
| 23 | + { |
| 24 | + "cveID": "CVE-2024-8068", |
| 25 | + "vendorProject": "Citrix", |
| 26 | + "product": "Session Recording", |
| 27 | + "vulnerabilityName": "Citrix Session Recording Improper Privilege Management Vulnerability", |
| 28 | + "dateAdded": "2025-08-25", |
| 29 | + "shortDescription": "Citrix Session Recording contains an improper privilege management vulnerability that could allow for privilege escalation to NetworkService Account access. An attacker must be an authenticated user in the same Windows Active Directory domain as the session recording server domain.", |
| 30 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 31 | + "dueDate": "2025-09-15", |
| 32 | + "knownRansomwareCampaignUse": "Unknown", |
| 33 | + "notes": "https:\/\/support.citrix.com\/external\/article\/691941\/citrix-session-recording-security-bullet.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-8068", |
| 34 | + "cwes": [ |
| 35 | + "CWE-269" |
| 36 | + ] |
| 37 | + }, |
| 38 | + { |
| 39 | + "cveID": "CVE-2024-8069", |
| 40 | + "vendorProject": "Citrix", |
| 41 | + "product": "Session Recording", |
| 42 | + "vulnerabilityName": "Citrix Session Recording Deserialization of Untrusted Data Vulnerability", |
| 43 | + "dateAdded": "2025-08-25", |
| 44 | + "shortDescription": "Citrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server.", |
| 45 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 46 | + "dueDate": "2025-09-15", |
| 47 | + "knownRansomwareCampaignUse": "Unknown", |
| 48 | + "notes": "https:\/\/support.citrix.com\/external\/article\/691941\/citrix-session-recording-security-bullet.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-8069", |
| 49 | + "cwes": [ |
| 50 | + "CWE-502" |
| 51 | + ] |
| 52 | + }, |
7 | 53 | { |
8 | 54 | "cveID": "CVE-2025-43300", |
9 | 55 | "vendorProject": "Apple", |
|
0 commit comments