CISA Adds 15 Recent and Older Vulnerabilities to ‘Must-Patch’ List


The United States Cybersecurity and Infrastructure Security Agency (CISA) this week added 15 more vulnerabilities to its list of security bugs known to be exploited in malicious attacks.

Initially announced in early November 2021, the list includes more than 300 vulnerabilities that are a frequent attack vector in malicious attacks, and which represent a significant risk to federal organizations.

The Known Exploited Vulnerabilities Catalog was published along with BOD 22-01, which requires federal organizations to address the vulnerabilities in the catalog within a specified period of time, and the same applies to the security defects added to the catalog this week.

For three of the issues, which affect VMware vCenter Server (CVE-2021-22017), various Hikvision products (CVE-2021-36260), and FatPipe WARP, IPVPN, and MPVPN (CVE-2021-27860), federal enterprises have only two weeks — until January 24 — to apply the available patches.

The remaining bugs — which impact Google Chrome, Microsoft Win32K and WinVerifyTrust, Oracle WebLogic Server, Synacor Zimbra Collaboration Suite, Fortinet FortiOS and FortiProxy, Palo Alto Networks PAN-OS, Exim Mail Transfer Agent, IBM WebSphere Application Server, Primetek Primefaces Application, and Elastic Kibana — need to be patched by July 10.

“BOD 22-01 requires FCEB agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats,” CISA reminds federal organizations.

Furthermore, the agency points out that every organization out there should plan to address the vulnerabilities in this “Must Patch” list as soon as possible, to prevent attacks.

Related: CISA Expands ‘Must-Patch’ List With Log4j, FortiOS, Other Vulnerabilities

Related: CISA Adds Zoho, Qualcomm, Mikrotik Flaws to ‘Must-Patch’ List

Related: Researchers Find 226 Vulnerabilities in Nine Wi-Fi Routers

view counter

Ionut Arghire is an international correspondent for SecurityWeek.

Previous Columns by Ionut Arghire:
Tags:

Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *