The Cybersecurity and Infrastructure Security Agency (CISA) has added 16 vulnerabilities to its Known Exploited Vulnerabilities Catalog. The issues include recently patched Apple WebKit zero-day, SeriousSAM, SMBv3, and Jenkins vulnerabilities among others.
On the heels of Apple’s recent security update for iOS 15.3.1, macOS Monterey 12.2.1, and Safari 15.3 with a fix for a zero-day WebKit remote code execution vulnerability CVE-2022-22620, CISA just added the same vulnerability to its Known Exploited Vulnerabilities Catalog on February 11, 2022.
Moreover, CISA also added the following 15 additional exploited vulnerabilities to the Catalog the previous day on February 10, 2022:
|CVE Number||Vulnerability Title|
|1||CVE-2021-36934||Microsoft Windows SAM Local Privilege Escalation Vulnerability|
|2||CVE-2020-0796||Microsoft SMBv3 Remote Code Execution Vulnerability|
|3||CVE-2018-1000861||Jenkins Stapler Web Framework Deserialization of Untrusted Data Vulnerability|
|4||CVE-2017-9791||Apache Struts 1 Improper Input Validation Vulnerability|
|5||CVE-2017-8464||Microsoft Windows Shell (.lnk) Remote Code Execution Vulnerability|
|6||CVE-2017-10271||Oracle Corporation WebLogic Server Remote Code Execution Vulnerability|
|7||CVE-2017-0263||Microsoft Win32k Privilege Escalation Vulnerability|
|8||CVE-2017-0262||Microsoft Office Remote Code Execution Vulnerability|
|9||CVE-2017-0145||Microsoft SMBv1 Remote Code Execution Vulnerability|
|10||CVE-2017-0144||Microsoft SMBv1 Remote Code Execution Vulnerability|
|11||CVE-2016-3088||Apache ActiveMQ Improper Input Validation Vulnerability|
|12||CVE-2015-2051||D-Link DIR-645 Router Remote Code Execution|
|13||CVE-2015-1635||Microsoft HTTP.sys Remote Code Execution Vulnerability|
|14||CVE-2015-1130||Apple OS X Authentication Bypass Vulnerability|
|15||CVE-2014-4404||Apple OS X Heap-Based Buffer Overflow Vulnerability|
Last July, Microsoft issued a security update for a serious zero-day vulnerability CVE-2021–36934 dubbed “SeriousSAM” (also known as HiveNightmare) that could allow an attacker to read any registry hives as a non-administrator.
In June, 2020, a security researcher had developed a proof-of-concept (PoC) code that could exploit an SMBv3 compression remote code execution (RCE) vulnerability CVE-2020-0796 on unpatched Windows systems.
In September, 2019, security experts uncovered an incident that involved the Watchbog cryptomining botnet. Attackers exploited CVE-2018-1000861 to establish a foothold on the victim’s network and install Watchbog malware on unpatched systems.