The United States Cybersecurity and Infrastructure Security Agency (CISA) this week added 15 more vulnerabilities to its list of security bugs known to be exploited in malicious attacks.
Initially announced in early November 2021, the list includes more than 300 vulnerabilities that are a frequent attack vector in malicious attacks, and which represent a significant risk to federal organizations.
The Known Exploited Vulnerabilities Catalog was published along with BOD 22-01, which requires federal organizations to address the vulnerabilities in the catalog within a specified period of time, and the same applies to the security defects added to the catalog this week.
For three of the issues, which affect VMware vCenter Server (CVE-2021-22017), various Hikvision products (CVE-2021-36260), and FatPipe WARP, IPVPN, and MPVPN (CVE-2021-27860), federal enterprises have only two weeks — until January 24 — to apply the available patches.
The remaining bugs — which impact Google Chrome, Microsoft Win32K and WinVerifyTrust, Oracle WebLogic Server, Synacor Zimbra Collaboration Suite, Fortinet FortiOS and FortiProxy, Palo Alto Networks PAN-OS, Exim Mail Transfer Agent, IBM WebSphere Application Server, Primetek Primefaces Application, and Elastic Kibana — need to be patched by July 10.
“BOD 22-01 requires FCEB agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats,” CISA reminds federal organizations.
Furthermore, the agency points out that every organization out there should plan to address the vulnerabilities in this “Must Patch” list as soon as possible, to prevent attacks.