CISA Identifies Four New Exploited Vulnerabilities to Address Risks
Cybersecurity2 min read

CISA Identifies Four New Exploited Vulnerabilities to Address Risks

14 Jan 202514 Jan 2025 cisa.gov

The Cybersecurity and Infrastructure Security Agency has added four significant vulnerabilities to its Known Exploited Vulnerabilities Catalog, emphasizing the need for timely remediation. These vulnerabilities pose a direct threat to the federal government's cybersecurity.

Key Takeaways

  • 1.“BOD 22-01 established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise,” the CISA stated in their report.
  • 2.“CISA will continue to add vulnerabilities to the catalog that meet the specified criteria,” the report confirmed, reinforcing their commitment to staying ahead in the battle against cyber threats.
  • 3.The Cybersecurity and Infrastructure Security Agency (CISA) recently announced the addition of four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, highlighting significant cybersecurity risks.

The Cybersecurity and Infrastructure Security Agency (CISA) recently announced the addition of four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, highlighting significant cybersecurity risks. The announcement, made on January 14, 2025, comes at a time when the agency is emphasizing the importance of safeguarding federal networks from potential threats.

Among the newly added vulnerabilities are two related to the Microsoft Windows Hyper-V, specifically CVE-2025-21335 and CVE-2025-21334. These are classified as Use-After-Free vulnerabilities within the NT Kernel Integration VSP. There is also a notable heap-based buffer overflow vulnerability, CVE-2025-21333, that can also be exploited within the same Microsoft system.

Furthermore, CISA included one vulnerability connected to Fortinet’s FortiOS system—CVE-2024-55591—which allows for an authorization bypass. Such vulnerabilities are particularly dangerous as they are common attack vectors exploited by cybercriminals.

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

According to the agency, these vulnerabilities pose significant risks to the federal enterprise and, under Binding Operational Directive (BOD) 22-01, it is essential for Federal Civilian Executive Branch (FCEB) agencies to address them promptly. “BOD 22-01 established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise,” the CISA stated in their report.

This directive mandates FCEB agencies to remediate the identified vulnerabilities by a specified due date to bolster network defenses against ongoing threats. CISA has made it clear that while this operational directive primarily targets federal entities, it encourages all organizations to take proactive measures. “We strongly urge all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice,” emphasized CISA.

The agency's proactive approach does not only offer a list for compliance but directs attention to the necessity of maintaining robust cybersecurity measures. “CISA will continue to add vulnerabilities to the catalog that meet the specified criteria,” the report confirmed, reinforcing their commitment to staying ahead in the battle against cyber threats.

As the cybersecurity landscape continues to evolve, the responsiveness of organizations to these advisories will determine their resilience against potential breaches. By adhering to the guidelines set forth in BOD 22-01 and the Known Exploited Vulnerabilities Catalog, federal and private entities alike can better fortify their defenses against malicious actors.

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

In an environment where cyber threats are becoming increasingly sophisticated, timely engagement with these advisories is more critical than ever. CISA highlights the need for ongoing vigilance in cybersecurity practices and the importance of addressing vulnerabilities as they are identified.

Moving forward, organizations should remain vigilant and proactive in identifying and patching these vulnerabilities to safeguard their systems from exploitation. CISA's evolving catalog serves as a vital resource for understanding the current threats, ultimately aiming to protect federal and private sectors alike against cyber intrusions.

More Stories