CISA Adds Three Vulnerabilities to Exploited Catalog Amid Rising Threats
Cybersecurity2 min read

CISA Adds Three Vulnerabilities to Exploited Catalog Amid Rising Threats

13 June 202413 June 2024 cisa.gov

The Cybersecurity and Infrastructure Security Agency has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, highlighting urgent cybersecurity risks. These updates aim to strengthen defenses against malicious cyber attacks.

Key Takeaways

  • 1.“Cyber vulnerabilities are frequent attack vectors for malicious actors and pose significant risks to the federal infrastructure,” stated a CISA spokesperson, emphasizing the threats posed by these newly recognized vulnerabilities.
  • 2.“This catalog serves as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise,” the spokesperson clarified, indicating the importance of keeping the list up to date to combat evolving cybersecurity challenges.
  • 3.“By integrating these vulnerabilities into their broader vulnerability management practices, organizations can significantly reduce their exposure to potential cyber threats,” the spokesperson added, highlighting the importance of proactive measures.

On June 13, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) announced the inclusion of three new vulnerabilities in its Known Exploited Vulnerabilities (KEV) Catalog. This initiative is crucial as threats from cyber adversaries increase, underscoring the importance of vigilance in safeguarding federal and organizational networks.

The newly added vulnerabilities include: CVE-2024-32896, which pertains to an Android Pixel privilege escalation vulnerability; CVE-2024-26169, identified as an improper privilege management flaw in Microsoft Windows Error Reporting Service; and CVE-2024-4358, notable for an authentication bypass by spoofing in Progress Telerik Report Server.

“Cyber vulnerabilities are frequent attack vectors for malicious actors and pose significant risks to the federal infrastructure,” stated a CISA spokesperson, emphasizing the threats posed by these newly recognized vulnerabilities.

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

As part of its Binding Operational Directive (BOD) 22-01, which focuses on mitigating threats from known exploited vulnerabilities, CISA has made it clear that this catalog is a dynamic tool. “This catalog serves as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise,” the spokesperson clarified, indicating the importance of keeping the list up to date to combat evolving cybersecurity challenges.

BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to address these vulnerabilities by designated deadlines. CISA's intent is to fortify defenses against active threats facing federal networks. “While BOD 22-01 specifically applies to FCEB agencies, CISA strongly urges all organizations to prioritize the timely remediation of vulnerabilities in the catalog to enhance their defenses against cyberattacks,” noted the spokesperson.

The call to action for organizations emphasizes a broader security imperative. “By integrating these vulnerabilities into their broader vulnerability management practices, organizations can significantly reduce their exposure to potential cyber threats,” the spokesperson added, highlighting the importance of proactive measures.

CISA continues to expand the KEV catalog as new vulnerabilities are identified, emphasizing a commitment to keeping pace with the rapidly shifting landscape of cyber threats. “We will keep updating the list to include any vulnerabilities that meet our specified criteria,” the spokesperson confirmed, reinforcing the agency's proactive approach to cybersecurity.

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

The recent entries into the catalog serve as a reminder that cyber risk is a significant concern for all sectors. Cybersecurity experts recommend organizations reassess and bolster their cybersecurity frameworks to address these pressing vulnerabilities, ensuring that active exploitation is effectively mitigated.

Impact and Legacy

In today's digital landscape, where cyber threats are constantly evolving, CISA's developments are crucial in guiding organizations in fortifying their defenses. Vigilance and prompt action remain the best strategies to safeguard against the potential impacts of these known vulnerabilities.

More Stories