The CISA has mentioned seven new vulnerabilities to the list of bugs that are actively exploited by threat actors as per the latest flaws published by Apple, SAP, Google and Microsoft.
The flaws have to be patched by Federal Civilian Executive Branch (FCEB) agencies. With the inclusion of these seven vulnerabilities the updated catalog now has 801 CVEs and the agencies linked to these flaws must have updated the associated patches within Sep 8th, 2022 as per CISA mandate.
CVE Number | Vulnerability Title |
CVE-2017-15944 | Palo Alto Networks PAN-OS Remote Code Execution Vulnerability |
CVE-2022-21971 | Microsoft Windows Runtime Remote Code Execution Vulnerability |
CVE-2022-26923 | Microsoft Active Directory Domain Services Privilege Escalation Vulnerability |
CVE-2022-2856 | Google Chrome Intents Insufficient Input Validation Vulnerability |
CVE-2022-32893 | Apple iOS and macOS Out-of-Bounds Write Vulnerability |
CVE-2022-32894 | Apple iOS and macOS Out-of-Bounds Write Vulnerability |
CVE-2022-22536 | SAP Multiple Products HTTP Request Smuggling Vulnerability |
The case with Palo Altos Networks vulnerability is surprising as the flaw was reported five years ago but there are devices that are still vulnerable to this exploit.
Security and IT teams are requested to look into the Known Exploited Vulnerabilities Catalog published by CISA and patch the listed flaws within their environment ASAP.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.
You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…