Ransomware

CISA Adds Flaws To Known Exploited Vulnerabilities Catalog

CISA recently updated its exploited vulnerabilities catalog, adding three new entries, including vulnerabilities found in D-Link routers and Google Chromium.

by Ashish Khaitan May 17, 2024 in Firewall Daily, Vulnerabilities Reading Time: 3 mins read 0

587 SHARES 3.3k VIEWS Share on LinkedInShare on Twitter

The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its catalog to include three new entries, including flaws within D-Link routers and Google Chromium. 

According to a post shared by CISA, among the listed vulnerabilities, one affects D-Link routers, a common target for cyberattacks. The is related to the router series, specifically revolving around Cross-Site Request Forgery (CSRF) concerns. 

CISA Adds Three Known Exploited Vulnerabilities

Exploiting the , malicious actors can hijack administrative privileges, allowing them to execute unauthorized actions remotely. 

Another D-Link router vulnerability listed is , affecting the DIR-605 model. This flaw enables attackers to obtain sensitive information like usernames and passwords through forged requests, posing a significant risk to affected users.

Additionally, CISA's catalog includes the , concerning Google Chromium's V8 engine. This Chromium vulnerability, marked with a severity rating of ‘High,' involves an out-of-bounds memory write issue.

Exploiting this flaw, remote attackers can execute malicious code via crafted HTML pages, potentially compromising user data and system integrity.

Importance of Catalog Vulnerabilities

These exploited vulnerabilities, once exploited, can lead to severe consequences, making them prime targets for cybercriminals. Notably, these entries are part of CISA's ongoing effort to maintain an updated list of significant threats facing federal networks.

The known exploited vulnerabilities catalog aligns with Binding Operational Directive (BOD) 22-01, aimed at mitigating risks within the federal enterprise. 

While BOD 22-01 specifically targets Federal Civilian Executive Branch (FCEB) agencies, CISA emphasizes the importance of all organizations prioritizing vulnerability remediation. 

By promptly addressing cataloged vulnerabilities, organizations can bolster their cybersecurity posture and reduce the risk of successful cyberattacks.

The Exploited Vulnerability Dilemma 

According to Bitsight's analysis, global companies struggle to address critical vulnerabilities promptly. The report draws from data from 1.4 million organizations, revealing that critical vulnerabilities take an average of 4.5 months to remediate, with over 60% unresolved past CISA's deadlines. 

Despite their prevalence, known exploited vulnerabilities (KEVs) remain a challenge for organizations. Derek Vadala, Chief Risk Officer at Bitsight, urges prioritization of vulnerability remediation, citing an average resolution time of 4.5 months for critical KEVs. Ransomware vulnerabilities, constituting 20% of the KEV catalog, prompt remediation efforts 2.5 times faster than non-ransomware KEVs. 

While federal agencies fare better in meeting CISA's deadlines, technology companies face the highest exposure to critical KEVs, with a faster remediation turnaround of 93 days. Roland Cloutier, a Bitsight advisor, stresses the need for enhanced vulnerability management, citing organizational challenges in assigning responsibility and ensuring visibility. 

Source

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button