CISA Adds Six Security Flaws to CVE Catalog, Urges Federal Agencies to Prioritize Patching

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has taken a crucial step in bolstering cybersecurity measures by adding six recently discovered security flaws to its Known Exploited Vulnerabilities (KEV) catalog. These vulnerabilities, which are actively being exploited, pose significant risks to various software and devices. CISA has recommended that federal agencies prioritize patching these vulnerabilities by January 29, 2024, to enhance their network security and mitigate potential threats.

CVE-2023-27524: High-severity vulnerability in Apache Superset

One of the critical vulnerabilities added to the CVE catalog is CVE-2023-27524, which impacts the popular Apache Superset open-source data visualization software. This high-severity vulnerability enables remote code execution, making it a prime target for cyber attackers. The vulnerability stems from a dangerous default configuration in Apache Superset that allows an unauthenticated attacker to gain remote code execution, harvest credentials, and compromise data. Although this vulnerability was first discovered in April 2023, the specific methods of exploitation remain unknown. It is imperative for organizations utilizing Apache Superset to address this vulnerability promptly and apply relevant patches and updates.

Other vulnerabilities addressed by CISA

The two critical vulnerabilities affecting Adobe ColdFusion software, with CVSS scores of 9.8, underscore the urgent need for patching. These vulnerabilities can potentially enable attackers to execute arbitrary code and compromise the targeted systems. Organizations utilizing Adobe ColdFusion should prioritize applying the latest security updates to prevent any unauthorized access or breaches.

Apple’s iOS ecosystem also faces threats from a code execution vulnerability, CVE-2023-41990, which has been utilized in Operation Triangulation spyware attacks. This vulnerability allows attackers to achieve remote code execution by exploiting specially crafted iMessage PDF attachments. Apple has made efforts to address this issue in iOS 15.7.8 and iOS 16.3, emphasizing the importance of updating devices to mitigate potential risks.

The CVE-2016-20017 vulnerability affecting D-Link devices is of high severity, with a CVSS score of 9.8. Exploiting this vulnerability can lead to unauthorized access and compromise of the affected devices. Organizations using D-Link devices should take immediate action to update firmware, enhance security controls, and prevent potential attacks.

CISA has also added a Joomla! access control vulnerability to the CVE catalog. Although specific details are not provided, it is essential for Joomla! users to stay vigilant and implement recommended security measures to safeguard their systems.

Recommendations for federal agencies

CISA has issued a vital recommendation to all federal agencies, urging them to prioritize applying fixes for the identified vulnerabilities by January 29, 2024. Given the active exploitation of these vulnerabilities, prompt action is essential to enhance network security and mitigate potential threats. Failure to address these security flaws in a timely manner could expose organizations to data breaches, unauthorized access, and other detrimental consequences.

The addition of these six security flaws to CISA’s CVE catalog highlights the evolving nature of cyber threats and the importance of proactive cybersecurity measures. Organizations utilizing Apache Superset, Adobe ColdFusion, Apple devices, D-Link devices, or Joomla! should take immediate action to address these vulnerabilities and apply relevant patches and updates. By doing so, they can significantly enhance their network security and protect sensitive data from being compromised by malicious actors. CISA’s recommendation for federal agencies to prioritize patching further emphasizes the urgency and criticality of addressing these vulnerabilities promptly. It is crucial for organizations of all sizes and sectors to remain vigilant, stay updated with security advisories, and invest in robust cybersecurity practices to stay one step ahead of potential threats.

Explore more