Site icon TheCyberThrone

CISA Adds Apple and TP-Link Vulnerabilities to KEV Catalog

Advertisements

On June 16, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited Vulnerabilities (KEV) Catalog by adding two high-risk vulnerabilities — one affecting Apple devices and the other targeting TP-Link routers. These additions signify active exploitation in the wild, making immediate remediation a top priority, particularly for federal agencies bound by Binding Operational Directive (BOD) 22-01.

1. CVE-2025-43200 – Apple Ecosystem Zero-Click Exploit

⚠️ Vulnerability Summary:

🛠️ How It Works:

This is a zero-click vulnerability—meaning the victim doesn’t have to interact with the payload. Attackers exploit flaws in how Apple devices process malicious photos or videos shared via iCloud Links. These media files can be weaponized to execute arbitrary code, enabling full device takeover.

🎯 Real-World Exploitation:

🛡️ Mitigation Guidance:

2. CVE-2023-33538 – TP-Link Routers Command Injection

⚠️ Vulnerability Summary:

🛠️ How It Works:

The vulnerability lies in the web management interface at the path /userRpm/WlanNetworkRpm. Unsanitized input allows attackers to inject system commands via crafted HTTP requests. Once successful, this enables remote code execution, which can be chained to deploy malware, create backdoors, or enslave devices into botnets.

🎯 Real-World Exploitation:

🛡️ Mitigation Guidance:

✅ Action Plan for Security Teams

Affected Vendor Key Actions Deadline Apple Update all iPhones, iPads, Macs, Apple Watches, and Vision Pro devices to latest security patches July 7, 2025 TP-Link Update firmware or replace outdated router models. Disable remote web access if possible July 7, 2025

🔐 Final Thoughts

These additions to CISA’s KEV list are not speculative—they reflect confirmed, real-world attacks. Apple’s zero-click exploit represents a severe risk to privacy and national security, while the TP-Link router flaw leaves homes and small businesses exposed to botnets and espionage.

Ignoring these threats can result in:

Security teams must prioritize these vulnerabilities immediately to ensure full compliance and prevent compromise.

Exit mobile version