Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 2, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 2, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 2, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 2, 2025

      How Red Hat just quietly, radically transformed enterprise server Linux

      June 2, 2025

      OpenAI wants ChatGPT to be your ‘super assistant’ – what that means

      June 2, 2025

      The best Linux VPNs of 2025: Expert tested and reviewed

      June 2, 2025

      One of my favorite gaming PCs is 60% off right now

      June 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      `document.currentScript` is more useful than I thought.

      June 2, 2025
      Recent

      `document.currentScript` is more useful than I thought.

      June 2, 2025

      Adobe Sensei and GenAI in Practice for Enterprise CMS

      June 2, 2025

      Over The Air Updates for React Native Apps

      June 2, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      You can now open ChatGPT on Windows 11 with Win+C (if you change the Settings)

      June 2, 2025
      Recent

      You can now open ChatGPT on Windows 11 with Win+C (if you change the Settings)

      June 2, 2025

      Microsoft says Copilot can use location to change Outlook’s UI on Android

      June 2, 2025

      TempoMail — Command Line Temporary Email in Linux

      June 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Microsoft, Ivanti, and More: 2024 KEV Catalog Highlights Vendor Vulnerabilities

    Microsoft, Ivanti, and More: 2024 KEV Catalog Highlights Vendor Vulnerabilities

    December 30, 2024

    KEV Catalog

    In 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) continued to build on its critical cybersecurity initiative by expanding its Known Exploited Vulnerabilities (KEV) catalog.  

    This database, which serves as a vital tool for IT security teams and organizations globally, added 185 new vulnerabilities this year, bringing the total number of software and hardware flaws at high risk of exploitation to 1,238. These vulnerabilities, which are actively being targeted by cybercriminals, can pose severe risks to infrastructure, data security, and operations across various sectors. 

    The steady growth of the KEV catalog, launched in November 2021, highlights the persistent threat posed by cyberattacks. This article explores the significant trends in the KEV catalog for 2024, identifies the most common vulnerabilities, and discusses the vendors that faced the highest number of software flaws this year. 

    A Steady Growth in the KEV Catalog 

    CISA’s KEV catalog has seen a consistent increase in the number of entries since its inception. In 2024, 185 vulnerabilities were added, slightly fewer than the 187 added in 2023. This stable rate of new entries follows a more explosive expansion in the early years of the catalog. In 2022, CISA added over 500 vulnerabilities in the first six months, and the initial launch saw more than 300 entries. 

    Interestingly, the catalog has not only grown in the number of new vulnerabilities but also in the age of vulnerabilities included. While most of this year’s entries were recent (115 from 2024), a significant portion (60 to 70) still consists of older vulnerabilities that remain actively exploited.  

    Notably, some of the earliest vulnerabilities, like CVE-2002-0367, dating back to 2002, continue to pose a risk, being leveraged in ransomware attacks. The oldest addition to the 2024 KEV catalog was CVE-2012-4792, a Use-After-Free vulnerability found in Microsoft Internet Explorer versions 6 through 8. 

    Prominent Software Weaknesses in the KEV Catalog 

    Among the 185 new entries in 2024, several software weaknesses, known as Common Weakness Enumerations (CWEs), were particularly prevalent. These weaknesses expose critical vulnerabilities that cybercriminals can exploit to gain unauthorized access to systems, disrupt services, or steal sensitive data. 

    The most common vulnerability type in the KEV catalog this year was CWE-78 (OS Command Injection), found in 14 of the added vulnerabilities. OS command injection occurs when an attacker is able to inject malicious commands into a system that is running an operating system, potentially leading to unauthorized control. 

    Hostinger

    CWE-502 (Deserialization of Untrusted Data) was the second most common vulnerability type, appearing in 11 of the new entries. This weakness allows attackers to exploit improperly handled or deserialized data, which can lead to remote code execution or unauthorized access. 

    Other notable vulnerabilities included CWE-416 (Use After Free), which appeared in 10 vulnerabilities, and CWE-22 (Path Traversal) and CWE-287 (Improper Authentication), both of which accounted for 9 vulnerabilities each. 

    Leading Vendors with the Most Vulnerabilities in CISA KEV 

    Microsoft continued to dominate the list of vendors with vulnerabilities added to the KEV catalog. In 2024, Microsoft had 36 vulnerabilities added to the list, up from 27 in 2023. The company’s widespread presence across enterprise systems, cloud platforms, and software products makes it a frequent target for cyberattacks. 

    Following Microsoft, Ivanti was the second most affected vendor, with 11 vulnerabilities added to the KEV catalog. This includes critical flaws that were exploited in a high-profile breach of CISA itself through an Ivanti vulnerability. Cyble’s honeypot sensor detected active attacks targeting Ivanti’s vulnerabilities as early as January 2024. 

    Other major vendors that faced multiple number of vulnerabilities in 2024 included Google Chromium (9 vulnerabilities), Adobe (8 vulnerabilities), and Apple (7 vulnerabilities). Vendors like Cisco, D-Link, Palo Alto Networks, and Apache also had several vulnerabilities added to the list, highlighting the broad range of industries and technologies impacted by these weaknesses. 

    A notable example of a vulnerability from 2024 is CVE-2024-39717, a 7.2-severity issue in Versa Director. Despite having just 31 web-exposed instances, this vulnerability was exploited in supply chain attacks targeting Internet Service Providers (ISPs) and Managed Service Providers (MSPs). This highlights a critical aspect of the KEV catalog: the severity of a vulnerability doesn’t always align with its exposure or CVSS (Common Vulnerability Scoring System) score. Even vulnerabilities with low exposure can be highly damaging if leveraged in targeted attacks. 

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleNew HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits
    Next Article When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions

    Related Posts

    Security

    Chrome Zero-Day Alert: CVE-2025-5419 Actively Exploited in the Wild

    June 2, 2025
    Security

    CISA Adds 5 Actively Exploited Vulnerabilities to KEV Catalog: ASUS Routers, Craft CMS, and ConnectWise Targeted

    June 2, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Amazon DynamoDB data modeling for Multi-Tenancy – Part 2

    Databases

    Rector v2.0

    Development

    Error Page Fault Paging File 751 (0x2EF): How to Fix it

    Operating Systems

    Genome Analysis Toolkit (GATK)

    Linux

    Highlights

    Databases

    Optimizing costs on Amazon DocumentDB using event-driven architecture and the AWS EventBridge Terraform module

    August 23, 2024

    A primary reason companies move their workloads to AWS is because of cost. With AWS,…

    CVE-2025-40582 – Siemens SCALANCE LPE9403 Command Injection Vulnerability

    May 13, 2025

    Vint Cerf on how today’s leaders can thrive in tomorrow’s AI-enabled internet

    April 8, 2025

    CVE-2025-46336 – Rack::Session Pool Session Restoration Vulnerability

    May 8, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.