Site icon TheCyberThrone

CISA Adds 7 Actively Exploited Vulnerabilities to KEV Catalog

Advertisements

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog in October 2025, adding several high-impact vulnerabilities being leveraged in real-world attacks. Organizations are urged to prioritize patching and mitigation to reduce exposure to these critical threats.

What is the KEV Catalog?

CISA’s KEV catalog is a dynamic resource containing vulnerabilities that are both actively exploited by malicious actors and pose substantial risk to enterprises and federal infrastructures. Catalog inclusion signals urgent prioritization for vulnerability management, requiring federal agencies to act within a defined deadline.

New Critical Additions

CVE-2025-61882 (Oracle E-Business Suite Pre-Auth RCE)

CVE-2010-3765 (Mozilla Firefox, Thunderbird, SeaMonkey RCE)

CVE-2011-3402 (Windows TrueType Font Parsing RCE)

CVE-2013-3918 (Windows InformationCardSigninHelper ActiveX RCE)

CVE-2021-43226 (Windows Common Log File System Driver Privilege Escalation)

CVE-2010-3962 (Internet Explorer 6, 7, 8 Use-After-Free RCE)

CVE-2021-22555 (Linux Kernel Netfilter Local Privilege Escalation)

Each of these vulnerabilities is known for enabling either remote code execution or privilege escalation, and several have been weaponized in real-world attacks or malware campaigns. Patching, monitoring, and (where applicable) legacy software retirement are strongly advised.

Real-World Risks & Exploitation

These vulnerabilities have been weaponized in the wild, with exploitation spanning ransomware (Oracle E-Business), advanced persistent threat groups (Windows/IE flaws), and automated malware targeting internet-exposed systems. Many impact legacy technologies still common in enterprise and critical infrastructure, making rapid patching essential.

Action Steps

Why KEV Additions Matter

KEV catalog entry is a clear signal: These flaws are not theoretical—they are actively targeted, with successful exploitation resulting in data theft, business interruption, or full system compromise. Security teams must elevate these CVEs in their vulnerability management pipeline immediately.

Exit mobile version