The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog by adding three critical vulnerabilities. These include CVE-2022-24816, CVE-2022-2586, and CVE-2020-13965, which affect GeoSolutionsGroup JAI-EXT, Linux Kernel, and Roundcube Webmail respectively. The updates highlight the severity of these flaws and the urgency for organizations to address them.
CVE-2022-24816, a code injection vulnerability in the GeoSolutionsGroup JAI-EXT project, is particularly severe with a CVSS score of 9.8. Exploiting this flaw can lead to remote code execution, making it a significant security risk. The issue was patched in GeoServer version 1.2.22 released in April 2022, with details and proof-of-concept (PoC) code available since August 2022.
The Linux Kernel vulnerability, CVE-2022-2586, has a CVSS score of 7.8 and involves a use-after-free error in nft tables that can lead to privilege escalation. Demonstrated exploits of this flaw were presented during the Pwn2Own Vancouver 2022, and the issue was fixed in August 2022, though details and PoC were published a few weeks later.
CVE-2020-13965 affects Roundcube Webmail with a CVSS score of 6.1, and involves a cross-site scripting (XSS) vulnerability. This flaw can allow arbitrary JavaScript code execution and was addressed in versions 1.4.5 and 1.3.12 released in June 2020. The binding directive requires federal agencies to fix these vulnerabilities by July 17, 2024, and private organizations are also advised to review and address these issues.
Reference: