Skip to content

CISA Updates Known Exploited Vulnerabilities Catalog - 20240109002

Overview

CISA has added six items to their Known Exploited Vulnerabilities catalog.

What is vulnerable?

CISA Article Product(s) Affected Summary Severity CVSS
CVE-2023-38203 Adobe ColdFusion versions 2018u17 (and earlier), 2021u7 (and earlier) and 2023u1 (and earlier) A Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction. Critical 9.8
CVE-2023-29300 Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) A Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction. Critical 9.8
CVE-2023-27524 Apache Superset versions up to and including 2.0.1 Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. Critical 9.8
CVE-2023-41990 AppleOS versions before tvOS 16.2, iOS 16.2 and iPadOS 16.2, macOS Monterey 12.6.7, macOS Big Sur 11.7.8, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.1, watchOS 9.2 Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1. High 7.8
CVE-2016-20017 D-Link DSL-2750B devices before 1.05 Allows remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022. Critical 9.8
CVE-2023-23752 Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints. Medium 5.3

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 Hours... (refer Patch Management):