The US Cybersecurity and Infrastructure Security Agency (CISA) has added 66 vulnerabilities to its list of known exploited security holes.
Introduced in November 2021 alongside Binding Operational Directive (BOD) 22-01, the Known Exploited Vulnerabilities Catalog is meant to raise awareness on security flaws that are being actively exploited in cyberattacks.
Three of the bugs newly added to the catalog were identified and addressed this year, two were resolved last year, and nine in 2020. The remaining vulnerabilities are older, some which were resolved over a decade ago.
CVE-2022-26318, the first of the three issues patched this year, is a critical-severity bug in WatchGuard Firebox and XTM appliances (Fireware OS) that could allow an unauthenticated attacker to execute arbitrary code.
[ READ: CISA’s ‘Must Patch’ List Puts Spotlight on Vulnerability Management Processes ]
Next in line is CVE-2022-26143, which impacts the TP-240 (aka tp240dvr) component in Mitel MiCollab. Remote attackers could exploit the vulnerability to leak sensitive information or cause a denial of service condition.
Roughly 2,600 MiCollab and MiVoice Business Express collaboration systems were found accessible from the Internet, thus potentially exposed to a new distributed denial of service (DDoS) attack method called TP240PhoneHome.
Third on the list is CVE-2022-21999, an elevation of privilege bug in the Windows Print Spooler that was addressed on Microsoft’s February 2022 Patch Tuesday.
Federal agencies have until April 15 to address the 66 security defects that CISA has just added to its Known Exploited Vulnerabilities Catalog.
In fact, CISA is encouraging federal agencies to take immediate action on all of the 570 issues now included in its Must Patch list.
While the catalog is meant for federal agencies, organizations worldwide are advised to review it and apply the available patches as soon as possible.
Related: CISA Urges Organizations to Patch Recent Firefox Zero-Days

More from Ionut Arghire
- Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security
- Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
- Google Temporarily Offering $180,000 for Full Chain Chrome Exploit
Latest News
- What if the Current AI Hype Is a Dead End?
- Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security
- Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
- SBOMs – Software Supply Chain Security’s Future or Fantasy?
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
