CISA Adds Five New Vulnerabilities to Exploited Software Catalog

Published:

spot_img

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently updated its Known Exploited Vulnerabilities (KEV) Catalog, adding five significant software flaws within just 18 hours. Among the newly identified vulnerabilities are those affecting enterprise solutions from companies such as Versa, Zimbra, as well as developer tools like Vite and Prettier.

On January 22, CISA incorporated these various vulnerabilities into its catalog and later included a critical flaw in VMware’s vCenter Server. This marked the tenth exploited vulnerability recognized in the catalog for this year.

According to standard protocol, CISA refrained from disclosing the identities of the threat actors involved or the specific methods of exploitation. However, the agency did indicate that these vulnerabilities are commonly targeted by malicious cyber entities and pose serious risks to federal operations.

Critical Flaws in Versa, Zimbra, and VMware Software

The vulnerability affecting the Versa Concerto, labeled CVE-2025-34026, has a severity rating of 9.2. This flaw pertains to improper authentication in the SD-WAN orchestration platform’s Traefik reverse proxy configuration. It presents a significant risk as an attacker could potentially access sensitive administrative endpoints, including internal actuator endpoints that provide access to heap dumps and trace logs. The issue impacts versions from 12.1.2 to 12.2.0, although there is a warning from the National Vulnerability Database (NVD) indicating that further versions might also be at risk.

Project Discovery originally uncovered this vulnerability along with two others last year. In another significant case, CVE-2024-37079, rated at 9.8, affects Broadcom’s VMware vCenter Server. This out-of-bounds write/heap overflow vulnerability is associated with the DCERPC protocol’s implementation. As outlined by the NVD, a malicious entity with network access to the vCenter Server could exploit this flaw by sending a specially crafted packet, enabling potential remote code execution.

The Cyber Express previously highlighted the concerning possibilities related to CVE-2024-37079 and related vulnerabilities in vCenter, noting the product’s widespread use globally increases the likelihood of threat actors exploiting such significant flaws.

Additionally, CVE-2025-68645, rated at 8.8, is a Local File Inclusion (LFI) vulnerability found in the Classic Webmail UI of Zimbra Collaboration (ZCS) versions 10.0 and 10.1. This flaw involves improper handling of user-requested parameters in the RestFilter servlet, allowing an unauthenticated attacker to craft requests to the /h/rest endpoint. This could influence internal request routing and enable the inclusion of arbitrary files from the WebRoot directory, posing a substantial security threat.

Vulnerabilities in Vite and Prettier Code Tools

Additionally, CVE-2025-54313 has been identified as a serious embedded malicious code vulnerability affecting the eslint-config-prettier package associated with the Prettier code formatting tool. This vulnerability originated from a supply chain attack in July. Specifically, the malicious code embedded in versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7 can execute an install.js file, thereby unleashing the node-gyp.dll malware on Windows systems, according to the NVD.

Furthermore, CVE-2025-31125 reflects a medium-to-high severity issue related to improper access control in Vite, a frontend tooling framework for JavaScript. This vulnerability can inadvertently expose the contents of restricted files when applications explicitly expose the Vite development server to the network. Relief comes from updates which rectify the issue in versions 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.

spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...