[Vulnerability Alert] CISA Adds 10 Known Exploited Vulnerabilities to KEV Catalog (2025/09/29-2025/10/05)
Subject: [Vulnerability Alert] CISA Adds 10 Known Exploited Vulnerabilities to KEV Catalog (2025/09/29-2025/10/05)
Content:
Forwarded from Taiwan Computer Network Emergency Response Team/Coordination Center TWCERTCC-200-202510-00000003
[CVE-2025-32463] Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability (CVSS v3.1: 9.3)
[Exploited by ransomware: Unknown] Sudo versions before 1.9.17p1 have a vulnerability that allows a local user to gain root privileges because the /etc/nsswitch.conf file from a user-controllable directory is used when the –chroot option is specified.
[Affected Platforms] Please refer to the official list of affected versions
[Exploited by ransomware: Unknown] Libraesva Email Security Gateway (ESG) has a command injection vulnerability that allows a command injection attack to be executed via a compressed email attachment.
[Affected Platforms] Please refer to the official list of affected versions
[CVE-2025-10035] Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 10.0)
[Exploited by ransomware: Known] Fortra GoAnywhere MFT has a Deserialization of Untrusted Data vulnerability that allows an attacker to forge a legitimate authorized response signature and deserialize an arbitrary object under their control, which may lead to command injection.
[Affected Platforms] Please refer to the official list of affected versions
[CVE-2025-20352] Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability (CVSS v3.1: 7.7)
[Exploited by ransomware: Unknown] Cisco IOS and IOS XE have a stack buffer overflow vulnerability in the SNMP subsystem that may lead to Denial of Service (DoS) or Remote Code Execution.
[Affected Platforms] Please refer to the official list of affected versions
[Exploited by ransomware: Unknown] Adminer has a Server-Side Request Forgery (SSRF) vulnerability that, if exploited, allows a remote attacker to obtain potentially sensitive information.
[Affected Platforms] Please refer to the official list of affected versions
[CVE-2014-6278] GNU Bash OS Command Injection Vulnerability (CVSS v3.1: 8.8)
[Exploited by ransomware: Unknown] GNU Bash has an OS Command Injection vulnerability that allows a remote attacker to execute arbitrary commands via a specially crafted environment variable.
[Affected Platforms] GNU Bash versions 1.14 through 4.3 (inclusive)
[Exploited by ransomware: Unknown] Jenkins has a Remote Code Execution vulnerability. This vulnerability allows an attacker to transmit a serialized Java SignedObject via the remote-communication based Jenkins CLI, which will be deserialized through a new ObjectInputStream, thereby bypassing existing blocklist-based protection mechanisms.
[Affected Platforms] Please refer to the official list of affected versions
[Exploited by ransomware: Unknown] Juniper ScreenOS has an Improper Authentication vulnerability that may allow unauthorized remote administrative access to the device.
[Affected Platforms] Please refer to the official list of affected versions
[CVE-2025-21043] Samsung Mobile Devices Out-of-Bounds Write Vulnerability (CVSS v3.1: 8.8)
[Exploited by ransomware: Unknown] Samsung Mobile Devices have an Out-of-Bounds Write vulnerability in libimagecodec.quram.so, allowing a remote attacker to execute arbitrary code.
[Affected Platforms] Please refer to the official list of affected versions
[Exploited by ransomware: Unknown] Smartbedded Meteobridge has a Command Injection vulnerability that may allow an unauthenticated remote attacker to execute arbitrary commands with elevated privileges (root) on the affected device.
[Affected Platforms] Please refer to the official list of affected versions
[CVE-2014-6278] The vulnerability may affect open-source components, third-party libraries, protocols, or specific implementations. Please apply the mitigation measures released by the product vendor for patching.
[CVE-2017-1000353] The official vendor has released a fix for the vulnerability. Please update to the relevant version.