The recent update from the Cybersecurity and Infrastructure Security Agency (CISA) has shed light on the increasing number of vulnerabilities being actively exploited in the wild. With the addition of five new vulnerabilities to the Known Exploited Vulnerabilities (KEV) Catalog, organizations are being warned about the potential risks associated with these flaws.
The vulnerabilities identified by CISA target a variety of products, including Cisco routers, Hitachi Vantara’s Pentaho Business Analytics Server, Microsoft Windows, and Progress Software’s WhatsUp Gold. These vulnerabilities pose a serious threat to organizations, with the potential for data breaches and system compromises.
One of the key vulnerabilities added to the catalog is CVE-2023-20118, which affects Cisco Small Business RV Series routers. This vulnerability allows remote attackers to execute arbitrary commands on affected devices by exploiting improper validation of user input within the router’s web-based management interface. The severity of this vulnerability has been rated as medium, with a CVSS score of 6.5.
Another vulnerability, CVE-2022-43939, targets Hitachi Vantara’s Pentaho Business Analytics Server and involves an authorization bypass flaw that allows unauthorized users to gain access to restricted areas of the server. The CVSS score for this vulnerability is high at 8.6, indicating the potential for unauthorized access and data compromise.
CVE-2022-43769 is a second vulnerability in the Hitachi Vantara Pentaho BA Server that allows special element injection, enabling attackers to exploit web services and compromise system integrity. With a CVSS score of 8.8, this vulnerability is considered high severity.
Microsoft Windows is also affected by CVE-2018-8639, which allows attackers to elevate their privileges within the system by exploiting improper resource shutdown in the Win32k component. Despite being identified in 2018, this vulnerability remains a notable threat across various Windows versions.
The most recent addition to the KEV Catalog is CVE-2024-4885, targeting Progress Software’s WhatsUp Gold with a critical path traversal vulnerability that allows unauthenticated attackers to execute arbitrary commands with system privileges.
Overall, the inclusion of these vulnerabilities in the KEV Catalog serves as a reminder of the importance of addressing security flaws promptly. Organizations are urged to regularly update their software, apply security patches, and monitor for potential vulnerabilities to reduce the risk of security breaches. Staying informed about known exploited vulnerabilities is crucial for strengthening cybersecurity defenses and mitigating potential threats.
CISA’s efforts to catalog these vulnerabilities and alert the public about ongoing threats play a vital role in enhancing security measures across both the federal and private sectors. By addressing vulnerabilities promptly and staying vigilant against potential threats, organizations can better protect themselves from cyber threats and ensure the security of their systems and data.