|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2025.09.03", |
4 | | - "dateReleased": "2025-09-03T17:00:44.122Z", |
5 | | - "count": 1410, |
| 3 | + "catalogVersion": "2025.09.04", |
| 4 | + "dateReleased": "2025-09-04T18:50:12.4837Z", |
| 5 | + "count": 1413, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2025-38352", |
| 9 | + "vendorProject": "Linux", |
| 10 | + "product": "Kernel", |
| 11 | + "vulnerabilityName": "Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability", |
| 12 | + "dateAdded": "2025-09-04", |
| 13 | + "shortDescription": "Linux kernel contains a time-of-check time-of-use (TOCTOU) race condition vulnerability that has a high impact on confidentiality, integrity, and availability.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2025-09-25", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/stable\/linux.git\/commit\/?id=2c72fe18cc5f9f1750f5bc148cf1c94c29e106ff ; https:\/\/source.android.com\/docs\/security\/bulletin\/2025-09-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-38352", |
| 18 | + "cwes": [ |
| 19 | + "CWE-367" |
| 20 | + ] |
| 21 | + }, |
| 22 | + { |
| 23 | + "cveID": "CVE-2025-48543", |
| 24 | + "vendorProject": "Android", |
| 25 | + "product": "Runtime", |
| 26 | + "vulnerabilityName": "Android Runtime Use-After-Free Vulnerability", |
| 27 | + "dateAdded": "2025-09-04", |
| 28 | + "shortDescription": "Android Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation.", |
| 29 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 30 | + "dueDate": "2025-09-25", |
| 31 | + "knownRansomwareCampaignUse": "Unknown", |
| 32 | + "notes": "https:\/\/source.android.com\/docs\/security\/bulletin\/2025-09-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48543", |
| 33 | + "cwes": [] |
| 34 | + }, |
| 35 | + { |
| 36 | + "cveID": "CVE-2025-53690", |
| 37 | + "vendorProject": "Sitecore", |
| 38 | + "product": "Multiple Products", |
| 39 | + "vulnerabilityName": "Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability", |
| 40 | + "dateAdded": "2025-09-04", |
| 41 | + "shortDescription": "Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud contain a deserialization of untrusted data vulnerability involving the use of default machine keys. This flaw allows attackers to exploit exposed ASP.NET machine keys to achieve remote code execution. ", |
| 42 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 43 | + "dueDate": "2025-09-25", |
| 44 | + "knownRansomwareCampaignUse": "Unknown", |
| 45 | + "notes": "https:\/\/support.sitecore.com\/kb?id=kb_article_view&sysparm_article=KB1003865 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-53690", |
| 46 | + "cwes": [ |
| 47 | + "CWE-502" |
| 48 | + ] |
| 49 | + }, |
7 | 50 | { |
8 | 51 | "cveID": "CVE-2023-50224", |
9 | 52 | "vendorProject": "TP-Link", |
|
0 commit comments