#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

34 C
Dubai
Sunday, June 1, 2025
HomeTopics 5Vulnerability ManagementCISA Adds Four New Exploited Vulnerabilities to Its Catalog: A Call for...

CISA Adds Four New Exploited Vulnerabilities to Its Catalog: A Call for Immediate Action

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of four newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, a critical resource designed to address vulnerabilities actively targeted by cybercriminals. These additions highlight vulnerabilities in diverse areas, including Android, CyberPanel, Nostromo nhttpd, and Palo Alto’s Expedition platform. As cyber threats become increasingly sophisticated, CISA’s updates emphasize the need for immediate mitigation actions to protect both federal and non-federal systems from potential exploitation.

Details of the Newly Added Vulnerabilities

CISA has identified and added the following four vulnerabilities to its KEV Catalog based on evidence of their active exploitation:

  1. CVE-2024-43093Android Framework Privilege Escalation Vulnerability: This vulnerability affects the Android Framework and could allow attackers to escalate privileges, granting unauthorized access to device resources.
  2. CVE-2024-51567CyberPanel Incorrect Default Permissions Vulnerability: CyberPanel’s incorrect default permissions can provide an attacker with unnecessary access to sensitive system files and settings.
  3. CVE-2019-16278 Nostromo nhttpd Directory Traversal Vulnerability: An older vulnerability in Nostromo’s nhttpd web server, this flaw allows attackers to execute directory traversal attacks, enabling unauthorized access to restricted directories.
  4. CVE-2024-5910Palo Alto Expedition Missing Authentication Vulnerability: This vulnerability in Palo Alto’s Expedition platform could allow unauthorized users to access critical functionalities due to missing authentication checks.

These vulnerabilities span multiple platforms and industries, emphasizing the widespread risks posed by such exploitation methods. CISA’s addition of these vulnerabilities to the KEV Catalog is a reminder of the agency’s commitment to securing the digital landscape against the most pressing cyber threats.

Understanding CISA’s Known Exploited Vulnerabilities Catalog

The Known Exploited Vulnerabilities Catalog, established under Binding Operational Directive (BOD) 22-01, is a living resource of identified Common Vulnerabilities and Exposures (CVEs) actively exploited in the wild. This catalog mandates Federal Civilian Executive Branch (FCEB) agencies to remediate cataloged vulnerabilities by specified due dates, reducing the risk of compromise. Although the directive primarily applies to federal agencies, CISA strongly encourages all organizations, public and private, to leverage this catalog as part of their cybersecurity strategies.

The Importance of Immediate Remediation

Exploited vulnerabilities present significant risks, and their remediation is essential to reducing attack surfaces. Unpatched systems remain attractive targets for malicious actors, particularly those leveraging automated tools to scan for susceptible environments. The addition of these vulnerabilities underscores the need for continuous vulnerability management, as attackers often prioritize high-value systems and known flaws.

10 Best Practices for Avoiding Vulnerability Exploitation

To help organizations address and prevent exploitation of vulnerabilities like those in the KEV Catalog, here are ten key practices:

  1. Implement a Regular Patch Management System: Prioritize and schedule patches for all systems, particularly those that are public-facing or critical to operations.
  2. Use Endpoint Detection and Response (EDR) Solutions: EDR tools can identify and contain malicious behavior on endpoints, mitigating risks posed by exploited vulnerabilities.
  3. Enable Multi-Factor Authentication (MFA): MFA provides an additional security layer, making it harder for attackers to access systems using stolen credentials.
  4. Apply the Principle of Least Privilege: Limit user permissions to only what is necessary, reducing the risk of privilege escalation attacks.
  5. Conduct Frequent Vulnerability Assessments: Regularly assess and scan networks for vulnerabilities to ensure timely identification and remediation.
  6. Educate Employees on Security Practices: Increase awareness of potential attack vectors, especially phishing attempts targeting system vulnerabilities.
  7. Use Network Segmentation: Isolate sensitive parts of the network to minimize the lateral movement of attackers in the event of a breach.
  8. Implement Intrusion Detection and Prevention Systems (IDPS): These systems monitor and respond to unusual network activities, flagging potential exploitation attempts.
  9. Adopt Zero Trust Architecture: This approach assumes that threats could originate from within the network, enforcing strict access controls and verification.
  10. Back Up Data Regularly: In case of ransomware attacks or system failures due to exploitation, recent backups ensure business continuity.

Conclusion

With cyber threats constantly evolving, the importance of proactive cybersecurity measures cannot be overstated. CISA’s latest additions to the Known Exploited Vulnerabilities Catalog serve as a critical reminder for organizations to stay vigilant and act swiftly. Addressing vulnerabilities in a timely manner is crucial to defending against exploitation, and leveraging best practices like regular patching, access controls, and employee training can drastically reduce risks.

Want to stay on top of cybersecurity news? Follow us on Facebook, X (Twitter), Instagram, and LinkedIn for the latest threats, insights, and updates!

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here