Snapshot
Dec. 9, 2022 - Dec. 16, 2022
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2022-42856 | Apple iOS contains a type confusion vulnerability when processing maliciously crafted web content leading to code execution. | N/A | Apple | Dec. 14, 2022 |
CVE-2022-27518 | Citrix Application Delivery Controller (ADC) and Gateway, when configured with SAML SP or IdP configuration, contain an authentication bypass vulnerability which allows an attacker to execute code as administrator. | CRITICAL | Citrix | Dec. 13, 2022 |
CVE-2022-42475 | Multiple versions of Fortinet FortiOS SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute arbitrary code or commands via specifically crafted requests. | N/A | Fortinet | Dec. 13, 2022 |
CVE-2022-44698 | Microsoft Defender SmartScreen contains a security feature bypass vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file. | N/A | Microsoft | Dec. 13, 2022 |
CVE-2022-26501 | The Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code. | CRITICAL | Veeam | Dec. 13, 2022 |
CVE-2022-26500 | The Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code. | HIGH | Veeam | Dec. 13, 2022 |
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2022-42856 | A type confusion issue was addressed with improved state handling. | N/A | Apple |
CISA Known Exploited Actively Exploited |
CVE-2022-31705 | VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller . | N/A | Risk Context N/A | |
CVE-2022-31702 | vRealize Network Insight contains a command injection vulnerability present in the vRNI REST API. | CRITICAL | Vmware | Risk Context N/A |
CVE-2022-41127 | Microsoft Dynamics NAV and Microsoft Dynamics 365 Business Central Remote Code Execution Vulnerability. | HIGH | Microsoft |
Remote Code Execution |
CVE-2022-41089 | .NET Framework Remote Code Execution Vulnerability. | HIGH | Microsoft |
Remote Code Execution |
CVE-2022-41076 | PowerShell Remote Code Execution Vulnerability. | HIGH | Microsoft |
Remote Code Execution |
CVE-2022-27518 | Unauthenticated remote arbitrary code execution | CRITICAL | Citrix |
CISA Known Exploited Actively Exploited |
CVE-2022-41128 | Windows Scripting Languages Remote Code Execution Vulnerability. | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution |
CVE-2022-37958 | SPNEGO Extended Negotiation Security Mechanism Information Disclosure Vulnerability. | HIGH | Risk Context N/A | |
CVE-2022-26501 | Veeam Backup & Replication 10.x and 11.x has Incorrect Access Control . | CRITICAL | Veeam |
CISA Known Exploited Actively Exploited |
CVE-2022-26500 | Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users... | HIGH | Veeam |
CISA Known Exploited Used In Ransomware |
CVE-2017-0144 | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Serv... | HIGH | Microsoft |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added 6 vulnerabilities to the known exploited vulnerabilities list.
Fortinet — FortiOS |
CVE-2022-42475 / Added: Dec. 13, 2022 |
CVSS Not Assigned |
Multiple versions of Fortinet FortiOS SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute arbitrary code or commands via specifically crafted requests. |
Headlines
|
Veeam — Backup & Replication |
CVE-2022-26501 / Added: Dec. 13, 2022 |
CRITICAL CVSS 9.80 |
The Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code. |
Headlines |
Veeam — Backup & Replication |
CVE-2022-26500 / Added: Dec. 13, 2022 |
HIGH CVSS 8.80 |
The Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code. |
Headlines |
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2022-42856 |
CVSS Not Assigned |
CISA Known Exploited Actively Exploited |
Published: Dec. 15, 2022 |
A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.1.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1.. |
Vendor Impacted: Apple |
Product Impacted: Ios |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-31705 |
CVSS Not Assigned |
Risk Context N/A |
Published: Dec. 14, 2022 |
VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-31702 |
CRITICAL CVSS 9.80 |
Risk Context N/A |
Published: Dec. 14, 2022 |
vRealize Network Insight (vRNI) contains a command injection vulnerability present in the vRNI REST API. A malicious actor with network access to the vRNI REST API can execute commands without authentication. |
Vendor Impacted: Vmware |
Product Impacted: Vrealize Network Insight |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2022-41127 |
HIGH CVSS 8.50 |
Remote Code Execution |
Published: Dec. 13, 2022 |
Microsoft Dynamics NAV and Microsoft Dynamics 365 Business Central (On Premises) Remote Code Execution Vulnerability. |
Vendor Impacted: Microsoft |
Products Impacted: Dynamics 365 Business Central, Dynamics Nav |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-41089 |
HIGH CVSS 8.80 |
Remote Code Execution |
Published: Dec. 13, 2022 |
.NET Framework Remote Code Execution Vulnerability. |
Vendor Impacted: Microsoft |
Products Impacted: Windows Server 2019, .net, Windows 11, Windows Server 2012, Windows 10, Windows 7, Windows Server 2008, Windows Server 2016, Windows Rt 8.1, Windows 8.1, Windows Server 2022 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-41076 |
HIGH CVSS 8.50 |
Remote Code Execution |
Published: Dec. 13, 2022 |
PowerShell Remote Code Execution Vulnerability. |
Vendor Impacted: Microsoft |
Products Impacted: Windows Server 2019, Windows 11, Windows Server 2012, Windows 10, Windows 7, Windows Server 2008, Windows Server 2016, Powershell, Windows Rt 8.1, Windows 8.1, Windows Server 2022 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-41128 |
HIGH CVSS 8.80 |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: Nov. 9, 2022 |
Windows Scripting Languages Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41118. |
Vendor Impacted: Microsoft |
Products Impacted: Windows Server 2019, Windows 11, Windows, Windows Server 2012, Windows Server 2008, Windows 10, Windows 7, Windows Server 2016, Windows 8.1, Windows Server 2022 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-37958 |
HIGH CVSS 7.50 |
Risk Context N/A |
Published: Sept. 13, 2022 |
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Information Disclosure Vulnerability. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-26501 |
CRITICAL CVSS 9.80 |
CISA Known Exploited Actively Exploited |
Published: March 17, 2022 |
Veeam Backup & Replication 10.x and 11.x has Incorrect Access Control (issue 1 of 2). |
Vendor Impacted: Veeam |
Product Impacted: Backup & Replication |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-26500 |
HIGH CVSS 8.80 |
CISA Known Exploited Used In Ransomware |
Published: March 17, 2022 |
Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code. |
Vendor Impacted: Veeam |
Product Impacted: Backup & Replication |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2017-0144 |
HIGH CVSS 9.30 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: March 17, 2017 |
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148. |
Vendor Impacted: Microsoft |
Product Impacted: Smbv1 |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.