Alerts: CISA Adds Five Known Exploited Vulnerabilities to Catalog

Source URL: https://www.cisa.gov/news-events/alerts/2025/03/10/cisa-adds-five-known-exploited-vulnerabilities-catalog
Source: Alerts
Title: CISA Adds Five Known Exploited Vulnerabilities to Catalog

Feedly Summary: CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.

CVE-2025-25181 Advantive VeraCore SQL Injection Vulnerability
CVE-2024-57968 Advantive VeraCore Unrestricted File Upload Vulnerability
CVE-2024-13159 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability
CVE-2024-13160 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability
CVE-2024-13161 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

AI Summary and Description: Yes

Summary: The text discusses the addition of five new vulnerabilities to the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities Catalog. It emphasizes the importance of timely remediation to mitigate potential cyber threats, particularly for federal agencies, and highlights the broader implications for all organizations regarding cybersecurity best practices.

Detailed Description:
The information provided relates to the significant cybersecurity risks posed by newly identified vulnerabilities. CISA’s Known Exploited Vulnerabilities Catalog serves as a crucial tool to enhance the security posture of organizations, especially within the federal sector. The catalog helps in prioritizing the remediation of vulnerabilities that are actively being exploited in the wild, thus minimizing the risk to critical systems.

Key Points:
– **New Vulnerabilities Added**: CISA has identified five vulnerabilities (CVE IDs) that are actively exploited:
– **CVE-2025-25181**: A SQL Injection vulnerability in Advantive VeraCore.
– **CVE-2024-57968**: An unrestricted file upload vulnerability in Advantive VeraCore.
– **CVE-2024-13159/13160/13161**: Multiple absolute path traversal vulnerabilities in Ivanti Endpoint Manager (EPM).

– **Threat Landscape**: The highlighted vulnerabilities are noted as common attack vectors for threat actors, raising alarm on their potential widespread impact.

– **Binding Operational Directive (BOD) 22-01**: This directive by CISA establishes the Known Exploited Vulnerabilities Catalog. It emphasizes:
– Remediation requirements for Federal Civilian Executive Branch (FCEB) agencies to mitigate risks arising from these vulnerabilities.
– The ongoing nature of the catalog, as CISA will continue adding vulnerabilities as they become known.

– **Broader Implications**: While BOD 22-01 targets federal agencies, CISA encourages all organizations, regardless of sector, to take proactive steps in vulnerability management:
– Organizations should prioritize remediation efforts for vulnerabilities listed in the catalog to prevent cyberattacks.
– Continuous awareness and adaptation to the evolving threat landscape are essential for defending against malicious cyber activities.

This information is pertinent for security professionals who are tasked with vulnerability management and mitigation strategies, offering insights into regulatory requirements as well as best practices for securing infrastructure against exploitation.