DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Alerts

CISA adds 2 new vulnerabilities to catalog

Reading Time: 2 mins read
in Alerts

 

 

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of two new vulnerabilities to its Known Exploited Vulnerabilities Catalog.

The catalog lists vulnerabilities that carry a significant risk to the federal enterprise and are currently being actively exploited. The newly added vulnerabilities are the CVE-2020-5741 Plex Media Server Remote Code Execution Vulnerability and the CVE-2021-39144 XStream Remote Code Execution Vulnerability.

According to CISA, these types of vulnerabilities are frequent targets for malicious cyber actors and pose a significant risk to the federal enterprise. The agency urges all organizations to reduce their exposure to cyberattacks by prioritizing the timely remediation of catalog vulnerabilities as part of their vulnerability management practice.

The Known Exploited Vulnerabilities Catalog was established under Binding Operational Directive (BOD) 22-01, which requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats.

While the directive only applies to FCEB agencies, CISA strongly recommends all organizations to take measures to reduce their exposure to cyberattacks.

CISA will continue to add vulnerabilities to the catalog that meet the specified criteria. The catalog is a living list of known Common Vulnerabilities and Exposures (CVEs) that pose a significant risk to the federal enterprise and are currently being actively exploited.

Users can access the catalog to view newly added vulnerabilities and take appropriate action to protect their systems and data.

READ FULL ARTICLE
Tags: Alerts 2023CatalogCISACyberattackKnown Exploited Vulnerabilities CatalogMarch 2023Threat ActorsUpdatesVulnerabilities
ADVERTISEMENT

Related Posts

OpenAI fixes vulnerabilities in ChatGPT

OpenAI fixes vulnerabilities in ChatGPT

March 30, 2023
Vendors Alert 3CX Supply Chain Attack

Vendors Alert 3CX Supply Chain Attack

March 30, 2023
Mozilla Fixes Thunderbird Vulnerability

Mozilla Fixes Thunderbird Vulnerability

March 30, 2023
Chinese state hackers target Linux servers

Chinese state hackers target Linux servers

March 30, 2023

More Articles

Alerts

Microsoft security advisory (AV22-126)

March 8, 2022
Incidents

Ontario Teachers’ Data Stolen in Ransomware Attack

November 25, 2022
Book

Cybersecurity Compliance (NYCRR 500)

March 7, 2022
Tool

Wired Relations – GDPR Compliance Software

March 24, 2022
Incidents

251k Impacted by Data Breach at Insurance Firm Bay Bridge Administrators

January 11, 2023
Document

OWASP Web Application Penetration Checklist

July 11, 2022
Document

2020 Cost of Insider Threats Global Report

April 12, 2022
Tool

Service-Oriented Modeling Framework (SOMF)

March 7, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.