Site icon TheCyberThrone

CISA KEV Catalog Update Part III – March 2025

Advertisements

The Cybersecurity and Infrastructure Security Agency (CISA) recently expanded its Known Exploited Vulnerabilities (KEV) Catalog to include five newly identified vulnerabilities in Ivanti Endpoint Manager (EPM) and Advantive VeraCore Order Management platforms. This update signals active exploitation of these vulnerabilities, emphasizing the urgency for organizations to address them through patching and comprehensive security strategies.

Ivanti Endpoint Manager (EPM) Vulnerabilities

1. Vulnerabilities Added

CISA identified and added the following critical vulnerabilities in Ivanti EPM:

These vulnerabilities are classified as absolute path traversal flaws with each earning a CVSS score of 9.8 (critical severity). Such scores underscore the extensive potential damage an exploit could inflict.

2. Implications

3. Affected Systems

4. Evidence of Exploitation

Initially, these vulnerabilities were publicly disclosed with no active exploitation reported. However, in January 2025, researchers at Horizon3.ai released a Proof-of-Concept (PoC) exploit demonstrating the vulnerabilities’ severity and ease of abuse. Subsequent activity confirmed real-world exploitation, prompting CISA to include these vulnerabilities in the KEV Catalog as active threats.

Advantive VeraCore Vulnerabilities

1. Vulnerabilities Added

CISA also identified and included two critical vulnerabilities affecting the Advantive VeraCore Order Management platform:

2. Technical and Operational Risks

3. Exploitation Attribution

The XE Group, a well-documented Vietnamese threat actor collective, has been linked to the exploitation of these vulnerabilities. Their attacks typically involve deploying web shells, reverse shells, and other malicious scripts to establish long-term persistence on compromised systems. Their focus appears to be directed at operational disruptions and credential harvesting.

Broader Implications of the Vulnerabilities

1. Operational Risks

Organizations relying on Ivanti EPM and Advantive VeraCore face immediate and significant risks:

2. Compliance and Regulatory Concerns

Under CISA Binding Operational Directive (BOD) 22-01, federal agencies are mandated to remediate vulnerabilities in the KEV Catalog by March 31, 2025. Non-compliance could result in penalties or restrictions on federal operations. Moreover, private sector organizations are strongly encouraged to address these vulnerabilities as part of their commitment to cybersecurity best practices and regulatory standards like GDPR, HIPAA, or PCI DSS.

Recommended Mitigation Strategies

1. Patch and Update Systems

2. Network Access Controls

3. Detection and Monitoring

4. Secure Software Configuration

5. Incident Response Preparedness

Conclusion

The inclusion of these vulnerabilities in CISA’s Known Exploited Vulnerabilities Catalog serves as a stark warning about the dangers of unpatched software in today’s threat landscape. Organizations must prioritize the timely application of patches, adopt advanced monitoring solutions, and implement a multi-layered security posture to mitigate risks associated with these exploits. Failure to act could result in significant operational, financial, and reputational damage, particularly given the increasing sophistication of adversaries like the XE Group.

Exit mobile version