CISA Known Exploited Vulnerabilities (KEV)
To support the cybersecurity community and help network defenders stay ahead of active threat activity, CISA publishes cisa alert today updates and maintains the authoritative catalog of known exploited vulnerabilities. This KEV database highlights vulnerabilities that have been actively used in real-world attacks, making it an essential resource for security teams aiming to strengthen their defenses.
Organizations should incorporate the KEV catalog into their vulnerability management prioritization framework to ensure they address high-risk issues efficiently and stay aligned with the latest threat intelligence. With frequent updates — including entries marked as cisa kev added today — the catalog enables teams to react quickly to emerging exploitation trends. To streamline monitoring and improve response time, CVEfeed.io provides the freshest CISA KEV additions, delivering real-time visibility into newly identified exploited vulnerabilities and helping organizations maintain accurate, up-to-date security postures.
9.3
CVE-2013-3906 - Microsoft Graphics Component Memory Corruption Vulnerability -
Action Due Aug 15, 2022 Target Vendor : Microsoft
Description : Microsoft Graphics Component contains a memory corruption vulnerability which can allow for remote code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2013-3906
10.0
CVE-2022-24086 - Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability -
Action Due Mar 01, 2022 Target Vendor : Adobe
Description : Adobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-24086
8.8
CVE-2022-22620 - Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability -
Action Due Feb 25, 2022 Target Vendor : Apple
Description : Apple iOS, iPadOS, and macOS WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-22620
10.0
CVE-2018-1000861 - Jenkins Stapler Web Framework Deserialization of Untrusted Data Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Jenkins
Description : A code execution vulnerability exists in the Stapler web framework used by Jenkins
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2018-1000861
9.8
CVE-2017-9791 - Apache Struts 1 Improper Input Validation Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Apache
Description : The Struts 1 plugin in Apache Struts might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-9791
9.3
CVE-2017-8464 - Microsoft Windows Shell (.lnk) Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : Windows Shell in multiple versions of Microsoft Windows allows local users or remote attackers to execute arbitrary code via a crafted .LNK file
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-8464
7.5
CVE-2017-10271 - Oracle Corporation WebLogic Server Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Oracle
Description : Oracle Corporation WebLogic Server contains a vulnerability that allows for remote code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known
Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-10271
7.8
CVE-2017-0263 - Microsoft Win32k Privilege Escalation Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : Microsoft Win32k contains a privilege escalation vulnerability due to the Windows kernel-mode driver failing to properly handle objects in memory.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-0263
9.3
CVE-2017-0262 - Microsoft Office Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : A remote code execution vulnerability exists in Microsoft Office.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-0262
9.3
CVE-2017-0145 - Microsoft SMBv1 Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known
Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-0145
9.3
CVE-2017-0144 - Microsoft SMBv1 Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known
Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-0144
9.8
CVE-2016-3088 - Apache ActiveMQ Improper Input Validation Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Apache
Description : The Fileserver web application in Apache ActiveMQ allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2016-3088
10.0
CVE-2015-1635 - Microsoft HTTP.sys Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : Microsoft HTTP protocol stack (HTTP.sys) contains a vulnerability that allows for remote code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2015-1635
7.8
CVE-2015-1130 - Apple OS X Authentication Bypass Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Apple
Description : The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2015-1130
9.3
CVE-2014-4404 - Apple OS X Heap-Based Buffer Overflow Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Apple
Description : Heap-based buffer overflow in IOHIDFamily in Apple OS X, which affects, iOS before 8 and Apple TV before 7, allows attackers to execute arbitrary code in a privileged context.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2014-4404
7.8
CVE-2021-36934 - Microsoft Windows SAM Local Privilege Escalation Vulnerability -
Action Due Feb 24, 2022 Target Vendor : Microsoft
Description : If a Volume Shadow Copy (VSS) shadow copy of the system drive is available, users can read the SAM file which would allow any user to escalate privileges to SYSTEM level.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2021-36934
10.0
CVE-2020-0796 - Microsoft SMBv3 Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known
Notes : https://nvd.nist.gov/vuln/detail/CVE-2020-0796
10.0
CVE-2015-2051 - D-Link DIR-645 Router Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : D-Link
Description : D-Link DIR-645 Wired/Wireless Router allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.
Action : The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2015-2051
7.8
CVE-2022-21882 - Microsoft Win32k Privilege Escalation Vulnerability -
Action Due Feb 18, 2022 Target Vendor : Microsoft
Description : Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-21882
10.0
CVE-2022-22587 - Apple Memory Corruption Vulnerability -
Action Due Feb 11, 2022 Target Vendor : Apple
Description : Apple IOMobileFrameBuffer contains a memory corruption vulnerability which can allow a malicious application to execute arbitrary code with kernel privileges.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-22587