Site icon TheCyberThrone

CISA Expands KEV Catalog with Six Actively Exploited Vulnerabilities

Advertisements

The Cybersecurity and Infrastructure Security Agency (CISA) continues its momentum in strengthening federal and enterprise cybersecurity posture, announcing new additions to its Known Exploited Vulnerabilities (KEV) Catalog on October 14–15, 2025. These updates spotlight six actively exploited flaws impacting Microsoft Windows, Rapid7 Velociraptor, and SKYSEA Client View, Adobe Experience Manager each confirmed in live attack campaigns.

Why This Update Matters

CISA’s KEV catalog is one of the most authoritative vulnerability tracking databases in the world. It lists vulnerabilities confirmed to be exploited in real-world attacks, compelling federal agencies to patch them under Binding Operational Directive (BOD) 22‑01 and urging private organizations to follow the same timeline.
The message here is clear — these vulnerabilities are not theoretical. They are being used right now in cyberattacks.

Highlights from the October 14–15 Additions

CVE‑2025‑24990 — Microsoft Windows Agere Modem Driver Elevation of Privilege

CVE‑2025‑59230 — Windows RasMan (Remote Access Connection Manager) Elevation of Privilege

CVE‑2025‑6264 — Rapid7 Velociraptor Remote Code Execution

CVE‑2016‑7836 — SKYSEA Client View Remote Code Execution

CVE‑2025‑47827 — IGEL OS Secure Boot Bypass

CVE-2025-54253 — Adobe Experience Manager (AEM) Forms on JEE Remote Code Execution

Technical Summary:

CVE-2025-54253 is a critical zero-day vulnerability arising from an insecure debug servlet (/adminui/debug) left enabled in AEM Forms on JEE. This servlet unsafely evaluates user-supplied OGNL expressions as Java code without proper validation or authentication. An attacker can craft a malicious HTTP request embedding OGNL payloads to execute arbitrary system commands on the vulnerable server remotely.

This vulnerability can be exploited with low complexity and offers an attacker full control over the affected server. Exploitation can lead to complete system compromise, data breaches, unauthorized persistence, and disruption of critical digital experience workflows managed by AEM.

Exploit Details:

Affected Configurations:

Mitigation:

BOD 22‑01: Required Action

Under CISA’s Binding Operational Directive 22‑01, all federal agencies must remediate these vulnerabilities no later than November 4, 2025. Private organizations, while not legally bound, are strongly encouraged to:

Key Takeaway

The October 2025 KEV update underscores a persistent truth — attackers will always exploit trusted tools and unpatched, familiar systems before investing in zero‑day research.
Security teams must prioritize these high‑confidence, actively exploited CVEs, integrating KEV intelligence into patch management programs and threat‑hunting workflows.

As the KEV catalog expands rapidly, it remains an essential real‑time barometer of the vulnerabilities that matter most. Staying current with its updates is the difference between being an observer and becoming a target.

Exit mobile version