CISA Adds Five New Vulnerabilities to KEV Catalog Amid Active Exploits

Article Highlights
Off On

A significant move to bolster cybersecurity has been made by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) following the addition of five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. This inclusion underscores an urgent need for immediate action as these vulnerabilities are being actively exploited. The targeted systems include Advantive VeraCore and Ivanti Endpoint Manager (EPM), both critical infrastructure components in various organizations. U.S. authorities are increasingly vigilant about cyber threats, evidenced by the prioritization of these specific vulnerabilities.

Notable Vulnerabilities in Advantive VeraCore

The vulnerabilities newly added to the KEV catalog affecting Advantive VeraCore are CVE-2024-57968, an unrestricted file upload flaw, and CVE-2025-25181, an SQL injection issue. These vulnerabilities have been exploited by the XE Group, a Vietnamese threat actor known for installing reverse and web shells that facilitate persistent remote access to compromised systems. The XE Group’s consistent targeting of these vulnerabilities highlights the urgent need for organizations to secure their systems against such breaches, which can have far-reaching consequences on operational integrity.

Despite the critical nature of these vulnerabilities, the public awareness and documentation around their exploitation have remained relatively low. This gap poses a considerable risk as the lack of detailed reporting can delay the response efforts by other organizations facing similar threats. Ensuring that patches are promptly applied and systems are regularly audited for vulnerabilities is a fundamental step toward mitigating these risks. Importantly, this underscores the broader need for enhanced threat intelligence sharing and active defense mechanisms across the industry to keep pace with the advancing tactics of cyber adversaries.

Ivanti EPM Vulnerabilities and Response

Further adding to the KEV catalog are vulnerabilities within the Ivanti Endpoint Manager (EPM), specifically CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161. These absolute path traversal vulnerabilities allow unauthorized attackers to manipulate file paths, leading to potential compromises of critical server resources. Although no public reports currently detail the exploitation of these Ivanti EPM vulnerabilities, they remain a pressing concern. Cybersecurity firm Horizon3.ai has previously released a proof-of-concept exploit, labeling these as “credential coercion” bugs that could enable unauthenticated attackers to compromise servers effectively.

In response to this, Federal Civilian Executive Branch (FCEB) agencies are required to patch these vulnerabilities by March 31, 2025. This mandate underscores the level of threat posed by these weaknesses and the importance of proactive measures in cybersecurity. The coordination between CISA, cybersecurity firms, and governmental agencies exemplifies a comprehensive approach to addressing these emerging threats. As attackers become more sophisticated, the need for rapid response and collaboration in mitigating these risks cannot be overstated.

A Broader Look at Global Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has taken a significant step to enhance cybersecurity by adding five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. This addition emphasizes the crucial need for prompt action, as these vulnerabilities are currently being actively exploited. The targeted systems include Advantive VeraCore and Ivanti Endpoint Manager (EPM), which are essential infrastructure components for numerous organizations. U.S. authorities are demonstrating increased vigilance regarding cyber threats, shown by their specific prioritization of these vulnerabilities. CISA’s efforts are a reminder of the ongoing battle against cyberattacks, highlighting the importance of staying ahead of potential threats. The inclusion of these vulnerabilities in the KEV catalog aims to ensure that organizations take immediate steps to mitigate the risks and protect their critical systems. As cyber threats evolve, the proactive measures by CISA are crucial in safeguarding the nation’s infrastructure from potential breaches and attacks. Hence, this action is a key move in fortifying the defense against cyber adversaries.

Explore more

D365 Supply Chain Tackles Key Operational Challenges

Imagine a mid-sized manufacturer struggling to keep up with fluctuating demand, facing constant stockouts, and losing customer trust due to delayed deliveries, a scenario all too common in today’s volatile supply chain environment. Rising costs, fragmented data, and unexpected disruptions threaten operational stability, making it essential for businesses, especially small and medium-sized enterprises (SMBs) and manufacturers, to find ways to

Cloud ERP vs. On-Premise ERP: A Comparative Analysis

Imagine a business at a critical juncture, where every decision about technology could make or break its ability to compete in a fast-paced market, and for many organizations, selecting the right Enterprise Resource Planning (ERP) system becomes that pivotal choice—a decision that impacts efficiency, scalability, and profitability. This comparison delves into two primary deployment models for ERP systems: Cloud ERP

Selecting the Best Shipping Solution for D365SCM Users

Imagine a bustling warehouse where every minute counts, and a single shipping delay ripples through the entire supply chain, frustrating customers and costing thousands in lost revenue. For businesses using Microsoft Dynamics 365 Supply Chain Management (D365SCM), this scenario is all too real when the wrong shipping solution disrupts operations. Choosing the right tool to integrate with this powerful platform

How Is AI Reshaping the Future of Content Marketing?

Dive into the future of content marketing with Aisha Amaira, a MarTech expert whose passion for blending technology with marketing has made her a go-to voice in the industry. With deep expertise in CRM marketing technology and customer data platforms, Aisha has a unique perspective on how businesses can harness innovation to uncover critical customer insights. In this interview, we

Why Are Older Job Seekers Facing Record Ageism Complaints?

In an era where workforce diversity is often championed as a cornerstone of innovation, a troubling trend has emerged that threatens to undermine these ideals, particularly for those over 50 seeking employment. Recent data reveals a staggering surge in complaints about ageism, painting a stark picture of systemic bias in hiring practices across the U.S. This issue not only affects