CISA Known Exploited Vulnerabilities (KEV)

To support the cybersecurity community and help network defenders stay ahead of active threat activity, CISA publishes cisa alert today updates and maintains the authoritative catalog of known exploited vulnerabilities. This KEV database highlights vulnerabilities that have been actively used in real-world attacks, making it an essential resource for security teams aiming to strengthen their defenses.

Organizations should incorporate the KEV catalog into their vulnerability management prioritization framework to ensure they address high-risk issues efficiently and stay aligned with the latest threat intelligence. With frequent updates — including entries marked as cisa kev added today — the catalog enables teams to react quickly to emerging exploitation trends. To streamline monitoring and improve response time, CVEfeed.io provides the freshest CISA KEV additions, delivering real-time visibility into newly identified exploited vulnerabilities and helping organizations maintain accurate, up-to-date security postures.

    8.8

    HIGH
    CVE-2024-29988 - Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability -

    Action Due May 21, 2024 Target Vendor : Microsoft

    Description : Microsoft SmartScreen Prompt contains a security feature bypass vulnerability that allows an attacker to bypass the Mark of the Web (MotW) feature. This vulnerability can be chained with CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988; https://nvd.nist.gov/vuln/detail/CVE-2024-29988

    Alert Date: Apr 30, 2024 | 637 days ago

    6.0

    MEDIUM
    CVE-2024-20359 - Cisco ASA and FTD Privilege Escalation Vulnerability -

    Action Due May 01, 2024 Target Vendor : Cisco

    Description : Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain a privilege escalation vulnerability that can allow local privilege escalation from Administrator to root.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h; https://nvd.nist.gov/vuln/detail/CVE-2024-20359

    Alert Date: Apr 24, 2024 | 643 days ago

    8.6

    HIGH
    CVE-2024-20353 - Cisco ASA and FTD Denial of Service Vulnerability -

    Action Due May 01, 2024 Target Vendor : Cisco

    Description : Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an infinite loop vulnerability that can lead to remote denial of service condition.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2; https://nvd.nist.gov/vuln/detail/CVE-2024-20353

    Alert Date: Apr 24, 2024 | 643 days ago

    10.0

    CRITICAL
    CVE-2024-4040 - CrushFTP VFS Sandbox Escape Vulnerability -

    Action Due May 01, 2024 Target Vendor : CrushFTP

    Description : CrushFTP contains an unspecified sandbox escape vulnerability that allows a remote attacker to escape the CrushFTP virtual file system (VFS).

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update&version=34; https://nvd.nist.gov/vuln/detail/CVE-2024-4040

    Alert Date: Apr 24, 2024 | 643 days ago

    7.8

    HIGH
    CVE-2022-38028 - Microsoft Windows Print Spooler Privilege Escalation Vulnerability -

    Action Due May 14, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows Print Spooler service contains a privilege escalation vulnerability. An attacker may modify a JavaScript constraints file and execute it with SYSTEM-level permissions.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38028; https://nvd.nist.gov/vuln/detail/CVE-2022-38028

    Alert Date: Apr 23, 2024 | 644 days ago

    10.0

    CRITICAL
    CVE-2024-3400 - Palo Alto Networks PAN-OS Command Injection Vulnerability -

    Action Due Apr 19, 2024 Target Vendor : Palo Alto Networks

    Description : Palo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.

    Action : Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See the vendor bulletin for more details and a patch release schedule.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security.paloaltonetworks.com/CVE-2024-3400 ; https://nvd.nist.gov/vuln/detail/CVE-2024-3400

    Alert Date: Apr 12, 2024 | 655 days ago

    9.8

    CRITICAL
    CVE-2024-3273 - D-Link Multiple NAS Devices Command Injection Vulnerability -

    Action Due May 02, 2024 Target Vendor : D-Link

    Description : D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contain a command injection vulnerability. When combined with CVE-2024-3272, this can lead to remote, unauthorized code execution.

    Action : This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3273

    Alert Date: Apr 11, 2024 | 656 days ago

    10.0

    HIGH
    CVE-2024-3272 - D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability -

    Action Due May 02, 2024 Target Vendor : D-Link

    Description : D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded credential that allows an attacker to conduct authenticated command injection, leading to remote, unauthorized code execution.

    Action : This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3272

    Alert Date: Apr 11, 2024 | 656 days ago

    7.8

    HIGH
    CVE-2024-29748 - Android Pixel Privilege Escalation Vulnerability -

    Action Due Apr 25, 2024 Target Vendor : Android

    Description : Android Pixel contains a privilege escalation vulnerability that allows an attacker to interrupt a factory reset triggered by a device admin app.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://source.android.com/docs/security/bulletin/pixel/2024-04-01; https://nvd.nist.gov/vuln/detail/CVE-2024-29748

    Alert Date: Apr 04, 2024 | 663 days ago

    5.5

    MEDIUM
    CVE-2024-29745 - Android Pixel Information Disclosure Vulnerability -

    Action Due Apr 25, 2024 Target Vendor : Android

    Description : Android Pixel contains an information disclosure vulnerability in the fastboot firmware used to support unlocking, flashing, and locking affected devices.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://source.android.com/docs/security/bulletin/pixel/2024-04-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29745

    Alert Date: Apr 04, 2024 | 663 days ago

    7.2

    HIGH
    CVE-2023-24955 - Microsoft SharePoint Server Code Injection Vulnerability -

    Action Due Apr 16, 2024 Target Vendor : Microsoft

    Description : Microsoft SharePoint Server contains a code injection vulnerability that allows an authenticated attacker with Site Owner privileges to execute code remotely.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24955; https://nvd.nist.gov/vuln/detail/CVE-2023-24955

    Alert Date: Mar 26, 2024 | 672 days ago

    10.0

    HIGH
    CVE-2019-7256 - Nice Linear eMerge E3-Series OS Command Injection Vulnerability -

    Action Due Apr 15, 2024 Target Vendor : Nice

    Description : Nice Linear eMerge E3-Series contains an OS command injection vulnerability that allows an attacker to conduct remote code execution.

    Action : Contact the vendor for guidance on remediating firmware, per their advisory.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://linear-solutions.com/wp-content/uploads/E3-Bulletin-06-27-2023.pdf, https://www.cisa.gov/news-events/ics-advisories/icsa-24-065-01; https://nvd.nist.gov/vuln/detail/CVE-2019-7256

    Alert Date: Mar 25, 2024 | 673 days ago

    9.8

    CRITICAL
    CVE-2021-44529 - Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection Vulnerability -

    Action Due Apr 15, 2024 Target Vendor : Ivanti

    Description : Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) contains a code injection vulnerability that allows an unauthenticated user to execute malicious code with limited permissions (nobody).

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2021-44529

    Alert Date: Mar 25, 2024 | 673 days ago

    9.8

    CRITICAL
    CVE-2023-48788 - Fortinet FortiClient EMS SQL Injection Vulnerability -

    Action Due Apr 15, 2024 Target Vendor : Fortinet

    Description : Fortinet FortiClient EMS contains a SQL injection vulnerability that allows an unauthenticated attacker to execute commands as SYSTEM via specifically crafted requests.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.fortiguard.com/psirt/FG-IR-24-007; https://nvd.nist.gov/vuln/detail/CVE-2023-48788

    Alert Date: Mar 25, 2024 | 673 days ago

    9.8

    CRITICAL
    CVE-2024-27198 - JetBrains TeamCity Authentication Bypass Vulnerability -

    Action Due Mar 28, 2024 Target Vendor : JetBrains

    Description : JetBrains TeamCity contains an authentication bypass vulnerability that allows an attacker to perform admin actions.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.jetbrains.com/help/teamcity/teamcity-2023-11-4-release-notes.html; https://nvd.nist.gov/vuln/detail/CVE-2024-27198

    Alert Date: Mar 07, 2024 | 691 days ago

    7.8

    HIGH
    CVE-2024-23296 - Apple Multiple Products Memory Corruption Vulnerability -

    Action Due Mar 27, 2024 Target Vendor : Apple

    Description : Apple iOS, iPadOS, macOS, tvOS, and watchOS RTKit contain a memory corruption vulnerability that allows an attacker with arbitrary kernel read and write capability to bypass kernel memory protections.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23296

    Alert Date: Mar 06, 2024 | 692 days ago

    7.8

    HIGH
    CVE-2024-23225 - Apple Multiple Products Memory Corruption Vulnerability -

    Action Due Mar 27, 2024 Target Vendor : Apple

    Description : Apple iOS, iPadOS, macOS, tvOS, watchOS, and visionOS kernel contain a memory corruption vulnerability that allows an attacker with arbitrary kernel read and write capability to bypass kernel memory protections.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214083, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214085, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214087, https://support.apple.com/en-us/HT214088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23225

    Alert Date: Mar 06, 2024 | 692 days ago

    10.0

    HIGH
    CVE-2021-36380 - Sunhillo SureLine OS Command Injection Vulnerablity -

    Action Due Mar 26, 2024 Target Vendor : Sunhillo

    Description : Sunhillo SureLine contains an OS command injection vulnerability that allows an attacker to cause a denial-of-service or utilize the device for persistence on the network via shell metacharacters in ipAddr or dnsAddr in /cgi/networkDiag.cgi.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.sunhillo.com/fb011/; https://nvd.nist.gov/vuln/detail/CVE-2021-36380

    Alert Date: Mar 05, 2024 | 693 days ago

    6.2

    MEDIUM
    CVE-2023-21237 - Android Pixel Information Disclosure Vulnerability -

    Action Due Mar 26, 2024 Target Vendor : Android

    Description : Android Pixel contains a vulnerability in the Framework component, where the UI may be misleading or insufficient, providing a means to hide a foreground service notification. This could enable a local attacker to disclose sensitive information.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://source.android.com/docs/security/bulletin/pixel/2023-06-01; https://nvd.nist.gov/vuln/detail/CVE-2023-21237

    Alert Date: Mar 05, 2024 | 693 days ago

    7.8

    HIGH
    CVE-2024-21338 - Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability -

    Action Due Mar 25, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows Kernel contains an exposed IOCTL with insufficient access control vulnerability within the IOCTL (input and output control) dispatcher in appid.sys that allows a local attacker to achieve privilege escalation.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338; https://nvd.nist.gov/vuln/detail/CVE-2024-21338

    Alert Date: Mar 04, 2024 | 694 days ago
Showing 20 of 1503 Results

Filters