Snapshot
Feb. 10, 2023 - Feb. 17, 2023
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2022-46169 | Cacti contains a command injection vulnerability that allows an unauthenticated user to execute code. | CRITICAL | Cacti | Feb. 16, 2023 |
CVE-2023-23529 | WebKit in Apple iOS, MacOS, Safari and iPadOS contains a type confusion vulnerability that may lead to code execution. | N/A | Apple | Feb. 14, 2023 |
CVE-2023-23376 | Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability which allows for privilege escalation. | HIGH | Microsoft | Feb. 14, 2023 |
CVE-2023-21823 | Microsoft Windows Graphic Component contains an unspecified vulnerability which allows for privilege escalation. | HIGH | Microsoft | Feb. 14, 2023 |
CVE-2023-21715 | Microsoft Office Publisher contains a security feature bypass vulnerability which allows for a local, authenticated attack on a targeted system. | HIGH | Microsoft | Feb. 14, 2023 |
CVE-2023-0669 | Fortra (formerly, HelpSystems) GoAnywhere MFT contains a pre-authentication remote code execution vulnerability in the License Response Servlet due to deserializing an attacker-controlled object. | HIGH | Fortra | Feb. 10, 2023 |
CVE-2015-2291 | Intel ethernet diagnostics driver for Windows IQVW32.sys and IQVW64.sys contain an unspecified vulnerability that allows for a denial-of-service. | HIGH | Intel | Feb. 10, 2023 |
CVE-2022-24990 | TerraMaster OS contains a remote command execution vulnerability that allows an unauthenticated user to execute commands on the target endpoint. | HIGH | TerraMaster | Feb. 10, 2023 |
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2023-21689 (6) | Microsoft Protected Extensible Authentication Protocol Remote Code Execution Vulnerability | CRITICAL |
Actively Exploited Remote Code Execution |
|
CVE-2022-45789 (6) | A CWE-294: Authentication Bypass by Capture-replay vulnerability exists that could cause execution of unauthorized Modbus fun... | CRITICAL | Schneider-Electric |
Remote Code Execution |
CVE-2022-45788 (6) | A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause arbitrary code executio... | CRITICAL | Schneider-Electric |
Remote Code Execution |
CVE-2023-23376 (18) | Windows Common Log File System Driver Elevation of Privilege Vulnerability | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution |
CVE-2023-21823 (17) | Windows Graphics Component Remote Code Execution Vulnerability | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution |
CVE-2023-21715 (18) | Microsoft Publisher Security Features Bypass Vulnerability | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution |
CVE-2023-0669 (9) | Fortra GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due ... | HIGH | Fortra |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added eight vulnerabilities to the known exploited vulnerabilities list.
Cacti — Cacti |
CVE-2022-46169 / Added: Feb. 16, 2023 |
CRITICAL CVSS 9.80 |
Cacti contains a command injection vulnerability that allows an unauthenticated user to execute code. |
Headlines |
Intel — Ethernet Diagnostics Driver for Windows |
CVE-2015-2291 / Added: Feb. 10, 2023 |
HIGH CVSS 7.20 |
Intel ethernet diagnostics driver for Windows IQVW32.sys and IQVW64.sys contain an unspecified vulnerability that allows for a denial-of-service. |
Headlines
|
TerraMaster — TerraMaster OS |
CVE-2022-24990 / Added: Feb. 10, 2023 |
HIGH CVSS 7.50 |
TerraMaster OS contains a remote command execution vulnerability that allows an unauthenticated user to execute commands on the target endpoint. |
Headlines
|
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2023-21689 |
CRITICAL CVSS 9.80 |
Actively Exploited Remote Code Execution |
Published: Feb. 14, 2023 |
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-45789 |
CRITICAL CVSS 9.80 |
Remote Code Execution |
Published: Jan. 31, 2023 |
A CWE-294: Authentication Bypass by Capture-replay vulnerability exists that could cause execution of unauthorized Modbus functions on the controller when hijacking an authenticated Modbus session. Affected Products: EcoStruxure™ Control Expert (All Versions), EcoStruxure™ Process Expert (Versions prior to V2020), Modicon M340 CPU - part numbers BMXP34* (All Versions), Modicon M580 CPU - part numbers BMEP* and BMEH* (All Versions), Modicon M580 CPU Safety - part numbers BMEP58*S and BMEH58*S (All Versions) |
Vendor Impacted: Schneider-Electric |
Products Impacted: Ecostruxure Control Expert, Ecostruxure Process Expert, Modicon M340 Bmxp342010 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-45788 |
CRITICAL CVSS 9.80 |
Remote Code Execution |
Published: Jan. 30, 2023 |
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause arbitrary code execution, denial of service and loss of confidentiality & integrity when a malicious project file is loaded onto the controller. Affected Products: EcoStruxure™ Control Expert (All Versions), EcoStruxure™ Process Expert (Versions prior to V2020), Modicon M340 CPU - part numbers BMXP34* (All Versions), Modicon M580 CPU - part numbers BMEP* and BMEH* (All Versions), Modicon M580 CPU Safety - part numbers BMEP58*S and BMEH58*S (All Versions), Modicon Momentum Unity M1E Processor - 171CBU* (All Versions), Modicon MC80 - BMKC80 (All Versions), Legacy Modicon Quantum - 140CPU65* and Premium CPUs - TSXP57* (All Versions) |
Vendor Impacted: Schneider-Electric |
Products Impacted: Modicon M580 Bmep586040 Firmware, Modicon M580 Bmep582020 Firmware, Modicon M580 Bmep585040c Firmware, Modicon M580 Bmeh586040c Firmware, Modicon M580 Bmeh584040s Firmware, Modicon M580 Bmeh582040 Firmware, Modicon M580 Bmep584040 Firmware, Modicon M580 Bmep581020h Firmware, Modicon M580 Bmeh586040s Firmware, Modicon M580 Bmep585040 Firmware, Modicon M580 Bmep582040h Firmware, Modicon M580 Bmep582040s Firmware, Modicon Mc80 Bmkc8020301 Firmware, Modicon Mc80 Bmkc8020310 Firmware, Modicon Mc80 Bmkc8030311 Firmware, Modicon M580 Bmep582020h Firmware, Ecostruxure Process Expert, Modicon M580 Bmeh586040 Firmware, Modicon M580 Bmep584040s Firmware, Modicon M580 Bmep586040c Firmware, Modicon M580 Bmep582040 Firmware, Modicon M580 Bmep581020 Firmware, Modicon M580 Bmep584020 Firmware, Ecostruxure Control Expert, Modicon M580 Bmeh582040s Firmware, Modicon M580 Bmep583040 Firmware, Modicon M580 Bmep583020 Firmware, Modicon M580 Bmeh584040c Firmware, Modicon M580 Bmeh584040 Firmware, Modicon M580 Bmeh582040c Firmware |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-23376 |
HIGH CVSS 7.80 |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: Feb. 14, 2023 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Vendor Impacted: Microsoft |
Product Impacted: Windows |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-21823 |
HIGH CVSS 7.80 |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: Feb. 14, 2023 |
Windows Graphics Component Remote Code Execution Vulnerability |
Vendor Impacted: Microsoft |
Product Impacted: Windows |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-0669 |
HIGH CVSS 7.20 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Feb. 6, 2023 |
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2. |
Vendor Impacted: Fortra |
Products Impacted: Goanywhere Managed File Transfer, Goanywhere Mft |
Quotes
|
Headlines
|
Back to top ↑ |
Ready to Offload Vulnerability Management?
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.