CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25

2 Min Read
2 Min Read

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Tuesday added 4 safety flaws to its Identified Exploited Vulnerabilities (KEV) catalog, citing proof of lively exploitation within the wild.

The listing of vulnerabilities is as follows –

  • CVE-2024-45195 (CVSS rating: 7.5/9.8) – A pressured looking vulnerability in Apache OFBiz that permits a distant attacker to acquire unauthorized entry and execute arbitrary code on the server (Fastened in September 2024)
  • CVE-2024-29059 (CVSS rating: 7.5) – An data disclosure vulnerability in Microsoft .NET Framework that might expose the ObjRef URI and result in distant code execution (Fastened in March 2024)
  • CVE-2018-9276 (CVSS rating: 7.2) – An working system command injection vulnerability in Paessler PRTG Community Monitor that permits an attacker with administrative privileges to execute instructions by way of the PRTG System Administrator internet console (Fastened in April 2018)
  • CVE-2018-19410 (CVSS rating: 9.8) – An area file inclusion vulnerability in Paessler PRTG Community Monitor that permits a distant, unauthenticated attacker to create customers with read-write privileges (Fastened in April 2018)

Though these shortcomings have since been addressed by the respective distributors, there are at the moment no public studies about how they might have been exploited in real-world assaults.

Federal Civilian Govt Department (FCEB) businesses have been urged to use the mandatory fixes by February 25, 2025, to safeguard towards lively threats.

See also  Google’s AI Co-Scientist vs. OpenAI’s Deep Research vs. Perplexity’s Deep Research: A Comparison of AI Research Agents
Share This Article
Leave a comment