• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

CISA Tells Organizations to Patch CVEs Dating Back to 2014

You are here: Home / General Cyber Security News / CISA Tells Organizations to Patch CVEs Dating Back to 2014
February 1, 2022

The US govt has additional 8 more vulnerabilities to its escalating list of CVEs that have to be patched by federal agencies, such as some that first appeared eight a long time back.

The Cybersecurity and Infrastructure Security Agency (CISA) initial released its Known Exploited Vulnerabilities Catalog in November 2021 as component of a federal government energy to improve cyber-resilience.

The Binding Operational Directive (BOD) 22-01 that enabled it applies only to civilian federal companies, but all businesses are inspired to monitor the listing on an ongoing foundation as aspect of best observe security efforts.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The most up-to-date eight additions to the catalog contain two that should be patched by February 11: a memory corruption vulnerability in Apple’s IOMobileFrameBuffer (CVE-2022-22587) and a stack-based mostly buffer overflow bug SonicWall SMA 100 appliances (CVE-2021-20038).

Curiously, although two of the remaining six CVEs were initially found and posted to the Nationwide Vulnerability Databases (NVD) in 2020, four come from numerous many years earlier.

These consist of two arbitrary code execution vulnerabilities in the GNU’s Bourne Yet again Shell (Bash) Unix shell and command language, from 2014 (CVE-2014-7169 and CVE-2014-6271).

Also, from 2014 is an Internet Explorer use-just after-cost-free bug (CVE-2014-1776).

The last CVE on the new checklist is a privilege escalation vulnerability in Intel’s Energetic Management Technology (AMT), Small Small business Technology (SBT), and Common Manageability offerings. It was very first released back again in 2017.

Apart from the Apple and SonicWall flaws, all those on the checklist ought to be patched by July 28 2022.

Their inclusion in the catalog is proof again that menace actors typically favor older CVEs that have been overlooked about alternatively than paying the time and resource looking into zero-times.

Yaniv Bar-Dayan, CEO and co-founder at Vulcan Cyber, argued that IT groups obtain it ever more complicated to remain on top of a mounting patch-load, never intellect repairing bugs from numerous several years ago.

“We have a couple of alternatives. Possibly we retain the services of more people today to remediate vulnerabilities and mitigate risk. Or we can be much more efficient with the men and women, sources and resources we presently have,” he included.

“The only way the cybersecurity business will be capable to lessen an more and more concerning accumulation of risk and affiliated cyber-debt will be by way of a risk-based solution to vulnerability prioritization and a properly-orchestrated tactic to risk mitigation. It isn’t effortless, but it is achievable if leaders make cyber-hygiene and risk administration a precedence.”

CISA now has around 350 vulnerabilities in its “must-patch” catalog.


Some pieces of this posting are sourced from:
www.infosecurity-journal.com

Previous Post: «ukraine continues to face cyber espionage attacks from russian hackers Ukraine Continues to Face Cyber Espionage Attacks from Russian Hackers
Next Post: FBI: Olympic Athletes Should Leave Devices at Home Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Ugandan Writers Charged with Cyber Stalking President
  • Russian Hackers Allegedly Compromise Ukrainian News Sites, Displaying ‘Z’ Symbol
  • A Third of Malicious Logins Originate in Nigeria
  • Open source dev attacked for spreading data-wiping ‘protestware’
  • Sandworm APT Hunts for ASUS Routers with Cyclops Blink Botnet
  • Arkansas Sues Health System for Abandoning Patient Files
  • Netflix to Charge Password Sharers
  • Hackers Target Bank Networks with new Rootkit to Steal Money from ATM Machines
  • Google Blows Lid Off Conti, Diavol Ransomware Access-Broker Ops
  • Experts Find Some Affiliates of BlackMatter Now Spreading BlackCat Ransomware

Copyright © TheCyberSecurity.News, All Rights Reserved.