Alerts: CISA Adds Four Known Exploited Vulnerabilities to Catalog

Source URL: https://www.cisa.gov/news-events/alerts/2024/11/07/cisa-adds-four-known-exploited-vulnerabilities-catalog
Source: Alerts
Title: CISA Adds Four Known Exploited Vulnerabilities to Catalog

Feedly Summary: CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.

CVE-2024-43093 Android Framework Privilege Escalation Vulnerability
CVE-2024-51567 CyberPanel Incorrect Default Permissions Vulnerability
CVE-2019-16278 Nostromo nhttpd Directory Traversal Vulnerability
CVE-2024-5910 Palo Alto Expedition Missing Authentication Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

AI Summary and Description: Yes

Summary: The text discusses the addition of four vulnerabilities to the CISA’s Known Exploited Vulnerabilities Catalog, emphasizing the significance of these vulnerabilities as active threats and the imperative for federal agencies to remediate them promptly. This information is crucial for security professionals involved in vulnerability management within various sectors.

Detailed Description:
The content outlines important updates regarding vulnerabilities that pose risks to federal networks and provides guidance on mitigating these risks. This is particularly relevant for professionals in security roles, especially those tasked with vulnerability management and compliance.

* **New Vulnerabilities Added**:
– CVE-2024-43093: Android Framework Privilege Escalation Vulnerability
– CVE-2024-51567: CyberPanel Incorrect Default Permissions Vulnerability
– CVE-2019-16278: Nostromo nhttpd Directory Traversal Vulnerability
– CVE-2024-5910: Palo Alto Expedition Missing Authentication Vulnerability

* **Importance in Cybersecurity**:
– These vulnerabilities are recognized as frequent attack vectors for cybercriminals, making their timely identification and remediation critical.
– CISA’s action to include these vulnerabilities in the Known Exploited Vulnerabilities Catalog highlights the active threats within the cybersecurity landscape affecting federal agencies.

* **Regulatory Framework**:
– The Binding Operational Directive (BOD) 22-01 established guidelines for addressing significant risks associated with known vulnerabilities.
– This directive mandates Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by specified due dates, thereby reinforcing network security against ongoing threats.

* **Broader Implications**:
– Though the directive specifically applies to federal agencies, CISA recommends that all organizations adopt a proactive approach to reduce their exposure to cyberattacks by expediting the remediation of vulnerabilities listed in the Catalog.
– This guidance serves as a framework for best practices in vulnerability management across various sectors and organizations.

Understanding and monitoring these vulnerabilities is critical for organizations aiming to enhance their cybersecurity posture and comply with regulatory requirements.