|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.06.02", |
4 | | - "dateReleased": "2025-06-02T17:47:59.1391Z", |
5 | | - "count": 1357, |
| 3 | + "catalogVersion": "2025.06.03", |
| 4 | + "dateReleased": "2025-06-03T16:48:39.9414Z", |
| 5 | + "count": 1360, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2025-21479", |
| 9 | + "vendorProject": "Qualcomm", |
| 10 | + "product": "Multiple Chipsets", |
| 11 | + "vulnerabilityName": "Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability", |
| 12 | + "dateAdded": "2025-06-03", |
| 13 | + "shortDescription": "Multiple Qualcomm chipsets contain an incorrect authorization vulnerability. This vulnerability allows for memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-06-24", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "Please check with specific vendors (OEMs,) for information on patching status. For more information, please see: https:\/\/docs.qualcomm.com\/product\/publicresources\/securitybulletin\/june-2025-bulletin.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21479", |
| 18 | + "cwes": [ |
| 19 | + "CWE-863" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2025-21480", |
| 24 | + "vendorProject": "Qualcomm", |
| 25 | + "product": "Multiple Chipsets", |
| 26 | + "vulnerabilityName": "Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability", |
| 27 | + "dateAdded": "2025-06-03", |
| 28 | + "shortDescription": "Multiple Qualcomm chipsets contain an incorrect authorization vulnerability. This vulnerability allows for memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-06-24", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "Please check with specific vendors (OEMs,) for information on patching status. For more information, please see: https:\/\/docs.qualcomm.com\/product\/publicresources\/securitybulletin\/june-2025-bulletin.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21480", |
| 33 | + "cwes": [ |
| 34 | + "CWE-863" |
| 35 | + ] |
| 36 | + }, |
| 37 | + { |
| 38 | + "cveID": "CVE-2025-27038", |
| 39 | + "vendorProject": "Qualcomm", |
| 40 | + "product": "Multiple Chipsets", |
| 41 | + "vulnerabilityName": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability", |
| 42 | + "dateAdded": "2025-06-03", |
| 43 | + "shortDescription": "Multiple Qualcomm chipsets contain a use-after-free vulnerability. This vulnerability allows for memory corruption while rendering graphics using Adreno GPU drivers in Chrome.", |
| 44 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 45 | + "dueDate": "2025-06-24", |
| 46 | + "knownRansomwareCampaignUse": "Unknown", |
| 47 | + "notes": "Please check with specific vendors (OEMs,) for information on patching status. For more information, please see: https:\/\/docs.qualcomm.com\/product\/publicresources\/securitybulletin\/june-2025-bulletin.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-27038", |
| 48 | + "cwes": [ |
| 49 | + "CWE-416" |
| 50 | + ] |
| 51 | + }, |
7 | 52 | { |
8 | 53 | "cveID": "CVE-2021-32030", |
9 | 54 | "vendorProject": "ASUS", |
|
3683 | 3728 | "shortDescription": "NextGen Healthcare Mirth Connect contains a deserialization of untrusted data vulnerability that allows for unauthenticated remote code execution via a specially crafted request.", |
3684 | 3729 | "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", |
3685 | 3730 | "dueDate": "2024-06-10", |
3686 | | - "knownRansomwareCampaignUse": "Unknown", |
| 3731 | + "knownRansomwareCampaignUse": "Known", |
3687 | 3732 | "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/github.com\/nextgenhealthcare\/connect\/wiki\/4.4.1---What%27s-New ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-43208", |
3688 | 3733 | "cwes": [ |
3689 | 3734 | "CWE-502" |
|
0 commit comments