CISA Known Exploited Vulnerabilities (KEV)

To support the cybersecurity community and help network defenders stay ahead of active threat activity, CISA publishes cisa alert today updates and maintains the authoritative catalog of known exploited vulnerabilities. This KEV database highlights vulnerabilities that have been actively used in real-world attacks, making it an essential resource for security teams aiming to strengthen their defenses.

Organizations should incorporate the KEV catalog into their vulnerability management prioritization framework to ensure they address high-risk issues efficiently and stay aligned with the latest threat intelligence. With frequent updates — including entries marked as cisa kev added today — the catalog enables teams to react quickly to emerging exploitation trends. To streamline monitoring and improve response time, CVEfeed.io provides the freshest CISA KEV additions, delivering real-time visibility into newly identified exploited vulnerabilities and helping organizations maintain accurate, up-to-date security postures.

    9.8

    CRITICAL
    CVE-2024-23692 - Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability -

    Action Due Jul 30, 2024 Target Vendor : Rejetto

    Description : Rejetto HTTP File Server contains an improper neutralization of special elements used in a template engine vulnerability. This allows a remote, unauthenticated attacker to execute commands on the affected system by sending a specially crafted HTTP request.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : The patched Rejetto HTTP File Server (HFS) is version 3: https://github.com/rejetto/hfs?tab=readme-ov-file#installation, https://www.rejetto.com/hfs/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-23692

    Alert Date: Jul 09, 2024 | 550 days ago

    7.8

    HIGH
    CVE-2024-38080 - Microsoft Windows Hyper-V Privilege Escalation Vulnerability -

    Action Due Jul 30, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows Hyper-V contains a privilege escalation vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38080; https://nvd.nist.gov/vuln/detail/CVE-2024-38080

    Alert Date: Jul 09, 2024 | 550 days ago

    7.5

    HIGH
    CVE-2024-38112 - Microsoft Windows MSHTML Platform Spoofing Vulnerability -

    Action Due Jul 30, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows MSHTML Platform contains a spoofing vulnerability that has a high impact to confidentiality, integrity, and availability.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112; https://nvd.nist.gov/vuln/detail/CVE-2024-38112

    Alert Date: Jul 09, 2024 | 550 days ago

    6.7

    MEDIUM
    CVE-2024-20399 - Cisco NX-OS Command Injection Vulnerability -

    Action Due Jul 23, 2024 Target Vendor : Cisco

    Description : Cisco NX-OS contains a command injection vulnerability in the command line interface (CLI) that could allow an authenticated, local attacker to execute commands as root on the underlying operating system of an affected device.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP; https://nvd.nist.gov/vuln/detail/CVE-2024-20399

    Alert Date: Jul 02, 2024 | 557 days ago

    6.3

    MEDIUM
    CVE-2020-13965 - Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability -

    Action Due Jul 17, 2024 Target Vendor : Roundcube

    Description : Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to manipulate data via a malicious XML attachment.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12; https://nvd.nist.gov/vuln/detail/CVE-2020-13965

    Alert Date: Jun 26, 2024 | 563 days ago

    7.8

    HIGH
    CVE-2022-2586 - Linux Kernel Use-After-Free Vulnerability -

    Action Due Jul 17, 2024 Target Vendor : Linux

    Description : Linux Kernel contains a use-after-free vulnerability in the nft_object, allowing local attackers to escalate privileges.

    Action : Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://seclists.org/oss-sec/2022/q3/131; https://nvd.nist.gov/vuln/detail/CVE-2022-2586

    Alert Date: Jun 26, 2024 | 563 days ago

    10.0

    CRITICAL
    CVE-2022-24816 - OSGeo GeoServer JAI-EXT Code Injection Vulnerability -

    Action Due Jul 17, 2024 Target Vendor : OSGeo

    Description : OSGeo GeoServer JAI-EXT contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. The patched JAI-EXT is version 1.1.22: https://github.com/geosolutions-it/jai-ext/releases/tag/1.1.22, https://github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx; https://nvd.nist.gov/vuln/detail/CVE-2022-24816

    Alert Date: Jun 26, 2024 | 563 days ago

    9.8

    CRITICAL
    CVE-2024-4358 - Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability -

    Action Due Jul 04, 2024 Target Vendor : Progress

    Description : Progress Telerik Report Server contains an authorization bypass by spoofing vulnerability that allows an attacker to obtain unauthorized access.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358; https://nvd.nist.gov/vuln/detail/CVE-2024-4358

    Alert Date: Jun 13, 2024 | 576 days ago

    7.8

    HIGH
    CVE-2024-26169 - Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability -

    Action Due Jul 04, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows Error Reporting Service contains an improper privilege management vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.

    Action : Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26169; https://nvd.nist.gov/vuln/detail/CVE-2024-26169

    Alert Date: Jun 13, 2024 | 576 days ago

    8.1

    HIGH
    CVE-2024-32896 - Android Pixel Privilege Escalation Vulnerability -

    Action Due Jul 04, 2024 Target Vendor : Android

    Description : Android Pixel contains an unspecified vulnerability in the firmware that allows for privilege escalation.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://source.android.com/docs/security/bulletin/pixel/2024-06-01; https://nvd.nist.gov/vuln/detail/CVE-2024-32896

    Alert Date: Jun 13, 2024 | 576 days ago

    7.8

    HIGH
    CVE-2024-4610 - Arm Mali GPU Kernel Driver Use-After-Free Vulnerability -

    Action Due Jul 03, 2024 Target Vendor : Arm

    Description : Arm Bifrost and Valhall GPU kernel drivers contain a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2024-4610

    Alert Date: Jun 12, 2024 | 577 days ago

    9.8

    CRITICAL
    CVE-2024-4577 - PHP-CGI OS Command Injection Vulnerability -

    Action Due Jul 03, 2024 Target Vendor : PHP Group

    Description : PHP, specifically Windows-based PHP used in CGI mode, contains an OS command injection vulnerability that allows for arbitrary code execution. This vulnerability is a patch bypass for CVE-2012-1823.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://www.php.net/ChangeLog-8.php#; https://nvd.nist.gov/vuln/detail/CVE-2024-4577

    Alert Date: Jun 12, 2024 | 577 days ago

    7.4

    HIGH
    CVE-2017-3506 - Oracle WebLogic Server OS Command Injection Vulnerability -

    Action Due Jun 24, 2024 Target Vendor : Oracle

    Description : Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an OS command injection vulnerability that allows an attacker to execute arbitrary code via a specially crafted HTTP request that includes a malicious XML document.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.oracle.com/security-alerts/cpuapr2017.html; https://nvd.nist.gov/vuln/detail/CVE-2017-3506

    Alert Date: Jun 03, 2024 | 586 days ago

    7.8

    HIGH
    CVE-2024-1086 - Linux Kernel Use-After-Free Vulnerability -

    Action Due Jun 20, 2024 Target Vendor : Linux

    Description : Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660; https://nvd.nist.gov/vuln/detail/CVE-2024-1086

    Alert Date: May 30, 2024 | 590 days ago

    8.6

    HIGH
    CVE-2024-24919 - Check Point Quantum Security Gateways Information Disclosure Vulnerability -

    Action Due Jun 20, 2024 Target Vendor : Check Point

    Description : Check Point Quantum Security Gateways contain an unspecified information disclosure vulnerability. The vulnerability potentially allows an attacker to access information on Gateways connected to the internet, with IPSec VPN, Remote Access VPN or Mobile Access enabled. This issue affects several product lines from Check Point, including CloudGuard Network, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark Appliances.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.checkpoint.com/results/sk/sk182336; https://nvd.nist.gov/vuln/detail/CVE-2024-24919

    Alert Date: May 30, 2024 | 590 days ago

    8.7

    HIGH
    CVE-2024-4978 - Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability -

    Action Due Jun 19, 2024 Target Vendor : Justice AV Solutions

    Description : Justice AV Solutions (JAVS) Viewer installer contains a malicious version of ffmpeg.exe, named fffmpeg.exe (SHA256: 421a4ad2615941b177b6ec4ab5e239c14e62af2ab07c6df1741e2a62223223c4). When run, this creates a backdoor connection to a malicious C2 server.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : Please follow the vendor’s instructions as outlined in the public statements at https://www.rapid7.com/blog/post/2024/05/23/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack#remediation and https://www.javs.com/downloads; https://nvd.nist.gov/vuln/detail/CVE-2024-4978

    Alert Date: May 29, 2024 | 591 days ago

    9.6

    CRITICAL
    CVE-2024-5274 - Google Chromium V8 Type Confusion Vulnerability -

    Action Due Jun 18, 2024 Target Vendor : Google

    Description : Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2024-5274

    Alert Date: May 28, 2024 | 592 days ago

    9.1

    CRITICAL
    CVE-2020-17519 - Apache Flink Improper Access Control Vulnerability -

    Action Due Jun 13, 2024 Target Vendor : Apache

    Description : Apache Flink contains an improper access control vulnerability that allows an attacker to read any file on the local filesystem of the JobManager through its REST interface.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/typ0h03zyfrzjqlnb7plh64df1g2383d; https://nvd.nist.gov/vuln/detail/CVE-2020-17519

    Alert Date: May 23, 2024 | 597 days ago

    9.6

    CRITICAL
    CVE-2024-4947 - Google Chromium V8 Type Confusion Vulnerability -

    Action Due Jun 10, 2024 Target Vendor : Google

    Description : Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html; https://nvd.nist.gov/vuln/detail/CVE-2024-4947

    Alert Date: May 20, 2024 | 600 days ago

    9.8

    CRITICAL
    CVE-2023-43208 - NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability -

    Action Due Jun 10, 2024 Target Vendor : NextGen Healthcare

    Description : NextGen Healthcare Mirth Connect contains a deserialization of untrusted data vulnerability that allows for unauthenticated remote code execution via a specially crafted request.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://github.com/nextgenhealthcare/connect/wiki/4.4.1---What%27s-New ; https://nvd.nist.gov/vuln/detail/CVE-2023-43208

    Alert Date: May 20, 2024 | 600 days ago
Showing 20 of 1490 Results

Filters