[CISA-2023:0622] CISA Adds 6 Known Exploited Vulnerabilities to Catalog
CISA has added 6 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
[CVE-2016-0165] Microsoft Win32k Privilege Escalation Vulnerability
Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.
- Action Apply updates per vendor instructions.
- Known To Be Used in Ransomware Campaigns?: Unknown
- Vendor: Microsoft
- Product: Win32k
- Due Date: Thu Jul 13 00:00:00 2023
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-039; https://nvd.nist.gov/vuln/detail/CVE-2016-0165
[CVE-2016-9079] Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability
Mozilla Firefox, Firefox ESR, and Thunderbird contain a use-after-free vulnerability in SVG Animation, targeting Firefox and Tor browser users on Windows.
- Action Apply updates per vendor instructions.
- Known To Be Used in Ransomware Campaigns?: Unknown
- Vendor: Mozilla
- Product: Firefox, Firefox ESR, and Thunderbird
- Due Date: Thu Jul 13 00:00:00 2023
- Notes: https://www.mozilla.org/en-US/security/advisories/mfsa2016-92/#CVE-2016-9079; https://nvd.nist.gov/vuln/detail/CVE-2016-9079
[CVE-2020-12641] Roundcube Webmail Remote Code Execution Vulnerability
Roundcube Webmail contains an remote code execution vulnerability that allows attackers to execute code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
- Action Apply updates per vendor instructions.
- Known To Be Used in Ransomware Campaigns?: Unknown
- Vendor: Roundcube
- Product: Roundcube Webmail
- Due Date: Thu Jul 13 00:00:00 2023
- Notes: https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10; https://nvd.nist.gov/vuln/detail/CVE-2020-12641
[CVE-2020-35730] Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability
Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows an attacker to send a plain text e-mail message with Javascript in a link reference element that is mishandled by linkref_addinindex in rcube_string_replacer.php.
- Action Apply updates per vendor instructions.
- Known To Be Used in Ransomware Campaigns?: Unknown
- Vendor: Roundcube
- Product: Roundcube Webmail
- Due Date: Thu Jul 13 00:00:00 2023
- Notes: https://roundcube.net/news/2020/12/27/security-updates-1.4.10-1.3.16-and-1.2.13; https://nvd.nist.gov/vuln/detail/CVE-2020-35730
[CVE-2021-44026] Roundcube Webmail SQL Injection Vulnerability
Roundcube Webmail is vulnerable to SQL injection via search or search_params.
- Action Apply updates per vendor instructions.
- Known To Be Used in Ransomware Campaigns?: Unknown
- Vendor: Roundcube
- Product: Roundcube Webmail
- Due Date: Thu Jul 13 00:00:00 2023
- Notes: https://roundcube.net/news/2021/11/12/security-updates-1.4.12-and-1.3.17-released; https://nvd.nist.gov/vuln/detail/CVE-2021-44026
[CVE-2023-20887] Vmware Aria Operations for Networks Command Injection Vulnerability
VMware Aria Operations for Networks (formerly vRealize Network Insight) contains a command injection vulnerability that allows a malicious actor with network access to perform an attack resulting in remote code execution.
- Action Apply updates per vendor instructions.
- Known To Be Used in Ransomware Campaigns?: Unknown
- Vendor: VMware
- Product: Aria Operations for Networks
- Due Date: Thu Jul 13 00:00:00 2023
- Notes: https://www.vmware.com/security/advisories/VMSA-2023-0012.html; https://nvd.nist.gov/vuln/detail/CVE-2023-20887
- ID
- CISA-2023:0622
- Severity
- critical
- Severity from
- CVE-2020-12641
- URL
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Published
-
2023-06-22T00:00:00
(15 months ago) - Modified
-
2023-06-22T00:00:00
(15 months ago) - Other Advisories
-
- ASA-201612-1
- ASA-201612-2
- ASA-202101-2
- DSA-3728-1
- DSA-3730-1
- DSA-4821-1
- DSA-5013-1
- ELSA-2016-2843
- ELSA-2016-2850
- FEDORA-2020-2a1a6a8432
- FEDORA-2020-aeffd92b77
- FEDORA-2021-167865df98
- FEDORA-2021-2cb0643316
- FEDORA-2021-43d3c10590
- FEDORA-2021-73359af51c
- FREEBSD:18F39FB6-7400-4063-ACAF-0806E92C094F
- GLSA-201701-15
- GLSA-201701-35
- GLSA-202007-41
- MFSA-2016-92
- MS:CVE-2016-0165
- openSUSE-SU-2016:3019-1
- openSUSE-SU-2020:1516-1
- openSUSE-SU-2021:0931-1
- openSUSE-SU-2021:0942-1
- openSUSE-SU-2021:0943-1
- openSUSE-SU-2021:0959-1
- openSUSE-SU-2021:0974-1
- openSUSE-SU-2021:1014-1
- RHSA-2016:2843
- RHSA-2016:2850
- SSA:2016-336-01
- SSA:2016-336-02
- SUSE-SU-2016:3048-1
- SUSE-SU-2016:3080-1
- SUSE-SU-2016:3105-1
- USN-3140-1
- USN-3141-1
- USN-5182-1
- VMSA-2023-0012.2
- VU:791496
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |