VulnerabilitiesHIGH

Vulnerabilities - CISA Adds Five Exploited CVEs to Catalog

CICISA Advisories
CVE-2025-31277CVE-2025-32432CVE-2025-43510CVE-2025-43520CVE-2025-54068
🎯

Basically, CISA found five security flaws that hackers are actively using.

Quick Summary

CISA has added five new vulnerabilities to its KEV Catalog, highlighting active exploitation risks. Federal agencies must act quickly to mitigate these threats. All organizations are urged to prioritize vulnerability remediation to protect their networks.

The Flaw

CISA has recently updated its Known Exploited Vulnerabilities (KEV) Catalog by adding five new vulnerabilities. These vulnerabilities have been identified as actively exploited in the wild, meaning that malicious actors are using them to compromise systems. The vulnerabilities include:

  • CVE-2025-31277: A buffer overflow vulnerability affecting multiple Apple products.
  • CVE-2025-32432: A code injection vulnerability in Craft CMS.
  • CVE-2025-43510: An improper locking vulnerability also affecting multiple Apple products.
  • CVE-2025-43520: Another buffer overflow vulnerability in Apple products.
  • CVE-2025-54068: A code injection vulnerability in Laravel Livewire.

These vulnerabilities represent frequent attack vectors that can lead to severe security breaches if not addressed promptly.

What's at Risk

The risks associated with these vulnerabilities are significant, particularly for federal agencies. The Binding Operational Directive (BOD) 22-01 mandates that Federal Civilian Executive Branch (FCEB) agencies must remediate these vulnerabilities by specified deadlines. Failing to do so could expose federal networks to active threats, potentially leading to data breaches or system compromises.

However, the implications extend beyond federal agencies. All organizations are encouraged to prioritize the remediation of vulnerabilities listed in the KEV Catalog to safeguard against cyberattacks. Ignoring these vulnerabilities can leave systems open to exploitation, putting sensitive data at risk.

Patch Status

CISA's inclusion of these vulnerabilities in the KEV Catalog highlights the urgency for organizations to act. While the specific patch status for each vulnerability may vary, organizations should actively seek updates from their software vendors. Keeping systems up to date with the latest security patches is crucial in mitigating risks associated with these vulnerabilities.

CISA will continue to monitor and update the KEV Catalog, adding vulnerabilities that meet the criteria for active exploitation. Organizations should regularly check the catalog for updates to stay informed about emerging threats.

Immediate Actions

Organizations should take immediate steps to protect their systems from these newly identified vulnerabilities. Here are some recommended actions:

  • Assess your systems: Identify if you are using any of the affected products.
  • Prioritize remediation: Focus on applying patches or workarounds for the vulnerabilities listed in the KEV Catalog.
  • Implement monitoring: Keep an eye on your systems for any signs of exploitation or unusual activity.

By taking these proactive measures, organizations can significantly reduce their exposure to cyber threats and enhance their overall security posture.

🔒 Pro insight: The addition of these CVEs to the KEV Catalog indicates an urgent need for organizations to prioritize patching to avoid exploitation.

Original article from

CISA Advisories · CISA

Read Full Article

Related Pings

CRITICALVulnerabilities

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks

A critical flaw in Langflow allows remote code execution, with attacks starting just 20 hours after disclosure. All versions before 1.8.1 are affected, raising significant security concerns. Immediate updates and audits are essential to protect sensitive data.

The Hacker News·
CRITICALVulnerabilities

Ubiquiti Vulnerability - Critical Account Takeover Risk

A critical vulnerability in Ubiquiti's UniFi Network Application poses a severe account takeover risk. With thousands of users potentially affected, immediate software updates are crucial. Don't wait for exploitation to occur; take action now to secure your network.

CyberScoop·
CRITICALVulnerabilities

Oracle Vulnerability - Critical Security Flaw Disclosed

Oracle has issued a critical security advisory for vulnerabilities in its Identity and Web Services Managers. Users must act quickly to mitigate risks and protect sensitive data. Stay informed and ensure your systems are updated.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Microsoft Intune - Hardening Urged After Stryker Hack

The FBI and CISA are urging organizations to strengthen Microsoft Intune security after the Stryker hack. This incident wiped over 200,000 devices, highlighting vulnerabilities. Companies must act now to protect sensitive data and prevent future breaches.

SC Media·
CRITICALVulnerabilities

Vulnerabilities - CISA Orders Feds to Patch Cisco Flaw

CISA has ordered federal agencies to patch a critical Cisco vulnerability by March 22. This flaw is actively exploited by ransomware gangs, posing a severe risk. Organizations must act quickly to secure their systems and prevent potential breaches.

BleepingComputer·
MEDIUMVulnerabilities

Gainsight Assist Vulnerabilities - Information Disclosure Fixed

Gainsight Assist recently faced vulnerabilities that could expose user email addresses and allow XSS attacks. Gainsight has released patches to fix these issues. Users should update their plugins immediately to stay secure.

Rapid7 Blog·