The US Cybersecurity and Infrastructure Security Agency (CISA) has added 66 vulnerabilities to its list of known exploited security holes.
Introduced in November 2021 alongside Binding Operational Directive (BOD) 22-01, the Known Exploited Vulnerabilities Catalog is meant to raise awareness on security flaws that are being actively exploited in cyberattacks.
Three of the bugs newly added to the catalog were identified and addressed this year, two were resolved last year, and nine in 2020. The remaining vulnerabilities are older, some which were resolved over a decade ago.
CVE-2022-26318, the first of the three issues patched this year, is a critical-severity bug in WatchGuard Firebox and XTM appliances (Fireware OS) that could allow an unauthenticated attacker to execute arbitrary code.
[ READ: CISA’s ‘Must Patch’ List Puts Spotlight on Vulnerability Management Processes ]
Next in line is CVE-2022-26143, which impacts the TP-240 (aka tp240dvr) component in Mitel MiCollab. Remote attackers could exploit the vulnerability to leak sensitive information or cause a denial of service condition.
Roughly 2,600 MiCollab and MiVoice Business Express collaboration systems were found accessible from the Internet, thus potentially exposed to a new distributed denial of service (DDoS) attack method called TP240PhoneHome.
Third on the list is CVE-2022-21999, an elevation of privilege bug in the Windows Print Spooler that was addressed on Microsoft’s February 2022 Patch Tuesday.
Federal agencies have until April 15 to address the 66 security defects that CISA has just added to its Known Exploited Vulnerabilities Catalog.
In fact, CISA is encouraging federal agencies to take immediate action on all of the 570 issues now included in its Must Patch list.
While the catalog is meant for federal agencies, organizations worldwide are advised to review it and apply the available patches as soon as possible.
Related: CISA Urges Organizations to Patch Recent Firefox Zero-Days

More from Ionut Arghire
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- Critical QNAP Vulnerability Leads to Code Injection
- GitHub Revokes Code Signing Certificates Following Cyberattack
- Vulnerabilities in OpenEMR Healthcare Software Expose Patient Data
- Russia-Linked APT29 Uses New Malware in Embassy Attacks
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Microsoft Urges Customers to Patch Exchange Servers
Latest News
- Sentra Raises $30 Million for DSPM Technology
- Cyber Insights 2023: Cyberinsurance
- Cyber Insights 2023: Attack Surface Management
- Cyber Insights 2023: Artificial Intelligence
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- How the Atomized Network Changed Enterprise Protection
- Critical QNAP Vulnerability Leads to Code Injection
