CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.

CVE-2024-45519 Synacor Zimbra Collaboration Command Execution Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See theÂBOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore More

Android Users Warned of Rising Malware Threat From Rafel RAT

June 24, 2024 0 Comments 0 tags

An earlier publication by Check Point Research had already linked Rafel to the APT-C-35/DoNot Team

Ivanti Releases Security Updates for Neurons for ITSM and Standalone Sentry

March 21, 2024 0 Comments 0 tags

Ivanti has released security advisories to address vulnerabilities in Ivanti Neurons for ITSM and Standalone Sentry. A cyber threat actor could exploit these vulnerabilities to take control of an affected system.Â

Iranian hackers using social media, job recruitment sites to lure Israeli spies

August 28, 2024 0 Comments 0 tags

In John le Carré novels, spyhunters traipse around Cold War-era European city streets pinpointing dead drop sites and piecing together puzzles of information that can lead them to double agents.