|
1 | 1 | { |
2 | 2 | "title": "CISA Catalog of Known Exploited Vulnerabilities", |
3 | | - "catalogVersion": "2026.01.26", |
4 | | - "dateReleased": "2026-01-26T20:47:09.659Z", |
5 | | - "count": 1499, |
| 3 | + "catalogVersion": "2026.01.27", |
| 4 | + "dateReleased": "2026-01-27T20:51:50.7688Z", |
| 5 | + "count": 1500, |
6 | 6 | "vulnerabilities": [ |
| 7 | + { |
| 8 | + "cveID": "CVE-2026-24858", |
| 9 | + "vendorProject": "Fortinet", |
| 10 | + "product": "Multiple Products", |
| 11 | + "vulnerabilityName": "Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability", |
| 12 | + "dateAdded": "2026-01-27", |
| 13 | + "shortDescription": "Fortinet FortiAnalyzer, FortiManager, FortiOS, and FortiProxy contain an authentication bypass using an alternate path or channel that could allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.", |
| 14 | + "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
| 15 | + "dueDate": "2026-01-30", |
| 16 | + "knownRansomwareCampaignUse": "Unknown", |
| 17 | + "notes": "Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-26-060 ; https:\/\/www.fortinet.com\/blog\/psirt-blogs\/analysis-of-sso-abuse-on-fortios ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-24858", |
| 18 | + "cwes": [ |
| 19 | + "CWE-288" |
| 20 | + ] |
| 21 | + }, |
7 | 22 | { |
8 | 23 | "cveID": "CVE-2018-14634", |
9 | 24 | "vendorProject": "Linux", |
|
70 | 85 | "product": "Office", |
71 | 86 | "vulnerabilityName": "Microsoft Office Security Feature Bypass Vulnerability", |
72 | 87 | "dateAdded": "2026-01-26", |
73 | | - "shortDescription": "Microsoft Office contains a security feature bypass vulnerability in which reliance on untrusted inputs in a security decision in Microsoft Office could allow an unauthorized attacker to bypass a security feature locally.", |
| 88 | + "shortDescription": "Microsoft Office contains a security feature bypass vulnerability in which reliance on untrusted inputs in a security decision in Microsoft Office could allow an unauthorized attacker to bypass a security feature locally. Some of the impacted product(s) could be end-of-life (EoL) and\/or end-of-service (EoS). Users are advised to discontinue use and\/or transition to a supported version.", |
74 | 89 | "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", |
75 | 90 | "dueDate": "2026-02-16", |
76 | 91 | "knownRansomwareCampaignUse": "Unknown", |
|
0 commit comments