Skip to content

Commit

Permalink
CISA Added Known Exploited Vulnerabilities to Catalog - 20240201001
Browse files Browse the repository at this point in the history
  • Loading branch information
LSerki authored Feb 1, 2024
1 parent f990fb5 commit a6245cb
Showing 1 changed file with 29 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
# CISA Added Known Exploited Vulnerabilities to Catalog - 20240201001

## Overview

CISA has added new vulnerabilities to its [Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog "Known Exploited Vulnerabilities Catalog"), based on evidence of active exploitation.

## What is vulnerable?

| Product(s) Affected | CVE | Severity | CVSS |
| ---------------------- | ------------------------------------------------------------------------------- | -------------------------------- | ---- |
| Apple Multiple Products Improper Authentication Vulnerability | [CVE-2022-48618](https://nvd.nist.gov/vuln/detail/CVE-2022-48618) | **High** | 7.8 |
| Ivanti Connect Secure, Policy Secure, and Neurons Server-Side | [CVE-2024-21893](https://nvd.nist.gov/vuln/detail/CVE-2024-21893) | **High** | 8.2 |

## What has been observed?

CISA added these vulnerabilties in their [Known Exploited Vulnerabilties](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) catalog on *2024-01-31*.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe (refer [Patch Management](../guidelines/patch-management.md)):


### Additional Resources


- [CISA Adds One Known Exploited Vulnerability to Catalog- Apple](https://www.cisa.gov/news-events/alerts/2024/01/31/cisa-adds-one-known-exploited-vulnerability-catalog)
- [CISA Adds One Known Exploited Vulnerability to Catalog - Ivanti](https://www.cisa.gov/news-events/alerts/2024/01/31/cisa-adds-one-known-exploited-vulnerability-catalog-0)


0 comments on commit a6245cb

Please sign in to comment.