The Cybersecurity and Infrastructure Security Agency (CISA) has identified three new vulnerabilities in its Known Exploited Vulnerabilities Catalog (KEVC), based on evidence of active exploitation.
Furthermore, these vulnerabilities are frequently used as attack vectors for cybercriminals and pose significant risks to the federal enterprise. The CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability, CVE-2021-45046 Apache Log4j2 Deserialization of Untrusted Data Vulnerability, and CVE-2023-21839 Oracle WebLogic Server Unspecified Vulnerability have all been added to the catalog.
Additionally, the KEVC is a living list of known Common Vulnerabilities and Exposures (CVEs) that pose significant risks to the federal enterprise, and it is established by the Binding Operational Directive (BOD) 22-01. This directive requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect their networks against active threats.
The newly identified CVEs have been added to the catalog, which is a call for FCEB agencies to take prompt action.
At the same time, CISA strongly advises all organizations to prioritize timely remediation of vulnerabilities included in the catalog as part of their vulnerability management practice. Although BOD 22-01 is applicable only to FCEB agencies, it encourages all organizations to minimize their exposure to cyberattacks.
Finally, CISA pledges to continue adding CVEs that satisfy the specified criteria to the catalog. By staying on top of the latest CVEs and keeping software and systems updated and patched, organizations can minimize the risk of falling victim to cyberattacks.