CISA adds 16 new vulnerabilities to Known Exploited Vulnerabilities Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has added 16 vulnerabilities to its Known Exploited Vulnerabilities Catalog. The issues include recently patched Apple WebKit zero-day, SeriousSAM, SMBv3, and Jenkins vulnerabilities among others.

On the heels of Apple’s recent security update for iOS 15.3.1, macOS Monterey 12.2.1, and Safari 15.3 with a fix for a zero-day WebKit remote code execution vulnerability CVE-2022-22620, CISA just added the same vulnerability to its Known Exploited Vulnerabilities Catalog on February 11, 2022.

Moreover, CISA also added the following 15 additional exploited vulnerabilities to the Catalog the previous day on February 10, 2022:

CVE NumberVulnerability Title
1CVE-2021-36934Microsoft Windows SAM Local Privilege Escalation Vulnerability
2CVE-2020-0796Microsoft SMBv3 Remote Code Execution Vulnerability
3CVE-2018-1000861Jenkins Stapler Web Framework Deserialization of Untrusted Data Vulnerability
4CVE-2017-9791Apache Struts 1 Improper Input Validation Vulnerability
5CVE-2017-8464Microsoft Windows Shell (.lnk) Remote Code Execution Vulnerability
6CVE-2017-10271Oracle Corporation WebLogic Server Remote Code Execution Vulnerability
7CVE-2017-0263Microsoft Win32k Privilege Escalation Vulnerability
8CVE-2017-0262Microsoft Office Remote Code Execution Vulnerability
9CVE-2017-0145Microsoft SMBv1 Remote Code Execution Vulnerability
10CVE-2017-0144Microsoft SMBv1 Remote Code Execution Vulnerability
11CVE-2016-3088 Apache ActiveMQ Improper Input Validation Vulnerability
12CVE-2015-2051D-Link DIR-645 Router Remote Code Execution
13CVE-2015-1635Microsoft HTTP.sys Remote Code Execution Vulnerability
14CVE-2015-1130Apple OS X Authentication Bypass Vulnerability
15CVE-2014-4404Apple OS X Heap-Based Buffer Overflow Vulnerability

Last July, Microsoft issued a security update for a serious zero-day vulnerability CVE-2021–36934 dubbed “SeriousSAM” (also known as HiveNightmare) that could allow an attacker to read any registry hives as a non-administrator.

In June, 2020, a security researcher had developed a proof-of-concept (PoC) code that could exploit an SMBv3 compression remote code execution (RCE) vulnerability CVE-2020-0796 on unpatched Windows systems.

In September, 2019, security experts uncovered an incident that involved the Watchbog cryptomining botnet. Attackers exploited CVE-2018-1000861 to establish a foothold on the victim’s network and install Watchbog malware on unpatched systems.