CISA adds 95 flaws to the Known Exploited Vulnerabilities Catalog

Pierluigi Paganini March 04, 2022

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 95 vulnerabilities to its Known Exploited Vulnerabilities Catalog.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added 95 vulnerabilities to its Known Exploited Vulnerabilities Catalog.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts recommend also private organizations review the Known Exploited Vulnerabilities Catalog and address the vulnerabilities in their infrastructure.

95 is the largest number of flaws added to the catalog since issuing the binding operational directive in 2021.

The flaws added to the catalog impact several products, including Windows, Office, Cisco, Oracle, Adobe, Mozilla, Siemens, Apache, Exim, Linux, and Treck TCP/IP stack.

The following two issues added by CISA to the catalog are very old, they are dated back 2002 and 2004 respectively:

  • CVE-2002-0367 – Microsoft Windows Privilege Escalation Vulnerability: smss.exe debugging subsystem in Microsoft Windows does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges.
  • CVE-2004-0210 – Microsoft Windows Privilege Escalation Vulnerability: A privilege elevation vulnerability exists in the POSIX subsystem. This vulnerability could allow a logged on user to take complete control of the system.

The due date for both vulnerabilities is March 24, 2022.

27 out of 95 vulnerabilities added by the US agency to the catalog have March 17, 2022 as due date, 8 of them have been rated with a CVSS score of 9.8.

The catalog of actively exploited bugs for federal agencies has reached a total of 478 entries with the latest added issues.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, catalog of actively exploited)

[adrotate banner=”5″]

[adrotate banner=”13″]



you might also like

leave a comment