Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 1, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 1, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 1, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 1, 2025

      7 MagSafe accessories that I recommend every iPhone user should have

      June 1, 2025

      I replaced my Kindle with an iPad Mini as my ebook reader – 8 reasons why I don’t regret it

      June 1, 2025

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025

      Elden Ring Nightreign already has a duos Seamless Co-op mod from the creator of the beloved original, and it’ll be “expanded on in the future”

      May 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Student Record Android App using SQLite

      June 1, 2025
      Recent

      Student Record Android App using SQLite

      June 1, 2025

      When Array uses less memory than Uint8Array (in V8)

      June 1, 2025

      Laravel 12 Starter Kits: Definite Guide Which to Choose

      June 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Photobooth is photobooth software for the Raspberry Pi and PC

      June 1, 2025
      Recent

      Photobooth is photobooth software for the Raspberry Pi and PC

      June 1, 2025

      Le notizie minori del mondo GNU/Linux e dintorni della settimana nr 22/2025

      June 1, 2025

      Rilasciata PorteuX 2.1: Novità e Approfondimenti sulla Distribuzione GNU/Linux Portatile Basata su Slackware

      June 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Microsoft, Ivanti, and More: 2024 KEV Catalog Highlights Vendor Vulnerabilities

    Microsoft, Ivanti, and More: 2024 KEV Catalog Highlights Vendor Vulnerabilities

    December 30, 2024

    KEV Catalog

    In 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) continued to build on its critical cybersecurity initiative by expanding its Known Exploited Vulnerabilities (KEV) catalog.  

    This database, which serves as a vital tool for IT security teams and organizations globally, added 185 new vulnerabilities this year, bringing the total number of software and hardware flaws at high risk of exploitation to 1,238. These vulnerabilities, which are actively being targeted by cybercriminals, can pose severe risks to infrastructure, data security, and operations across various sectors. 

    The steady growth of the KEV catalog, launched in November 2021, highlights the persistent threat posed by cyberattacks. This article explores the significant trends in the KEV catalog for 2024, identifies the most common vulnerabilities, and discusses the vendors that faced the highest number of software flaws this year. 

    A Steady Growth in the KEV Catalog 

    CISA’s KEV catalog has seen a consistent increase in the number of entries since its inception. In 2024, 185 vulnerabilities were added, slightly fewer than the 187 added in 2023. This stable rate of new entries follows a more explosive expansion in the early years of the catalog. In 2022, CISA added over 500 vulnerabilities in the first six months, and the initial launch saw more than 300 entries. 

    Interestingly, the catalog has not only grown in the number of new vulnerabilities but also in the age of vulnerabilities included. While most of this year’s entries were recent (115 from 2024), a significant portion (60 to 70) still consists of older vulnerabilities that remain actively exploited.  

    Notably, some of the earliest vulnerabilities, like CVE-2002-0367, dating back to 2002, continue to pose a risk, being leveraged in ransomware attacks. The oldest addition to the 2024 KEV catalog was CVE-2012-4792, a Use-After-Free vulnerability found in Microsoft Internet Explorer versions 6 through 8. 

    Prominent Software Weaknesses in the KEV Catalog 

    Among the 185 new entries in 2024, several software weaknesses, known as Common Weakness Enumerations (CWEs), were particularly prevalent. These weaknesses expose critical vulnerabilities that cybercriminals can exploit to gain unauthorized access to systems, disrupt services, or steal sensitive data. 

    The most common vulnerability type in the KEV catalog this year was CWE-78 (OS Command Injection), found in 14 of the added vulnerabilities. OS command injection occurs when an attacker is able to inject malicious commands into a system that is running an operating system, potentially leading to unauthorized control. 

    CWE-502 (Deserialization of Untrusted Data) was the second most common vulnerability type, appearing in 11 of the new entries. This weakness allows attackers to exploit improperly handled or deserialized data, which can lead to remote code execution or unauthorized access. 

    Other notable vulnerabilities included CWE-416 (Use After Free), which appeared in 10 vulnerabilities, and CWE-22 (Path Traversal) and CWE-287 (Improper Authentication), both of which accounted for 9 vulnerabilities each. 

    Leading Vendors with the Most Vulnerabilities in CISA KEV 

    Microsoft continued to dominate the list of vendors with vulnerabilities added to the KEV catalog. In 2024, Microsoft had 36 vulnerabilities added to the list, up from 27 in 2023. The company’s widespread presence across enterprise systems, cloud platforms, and software products makes it a frequent target for cyberattacks. 

    Following Microsoft, Ivanti was the second most affected vendor, with 11 vulnerabilities added to the KEV catalog. This includes critical flaws that were exploited in a high-profile breach of CISA itself through an Ivanti vulnerability. Cyble’s honeypot sensor detected active attacks targeting Ivanti’s vulnerabilities as early as January 2024. 

    Other major vendors that faced multiple number of vulnerabilities in 2024 included Google Chromium (9 vulnerabilities), Adobe (8 vulnerabilities), and Apple (7 vulnerabilities). Vendors like Cisco, D-Link, Palo Alto Networks, and Apache also had several vulnerabilities added to the list, highlighting the broad range of industries and technologies impacted by these weaknesses. 

    A notable example of a vulnerability from 2024 is CVE-2024-39717, a 7.2-severity issue in Versa Director. Despite having just 31 web-exposed instances, this vulnerability was exploited in supply chain attacks targeting Internet Service Providers (ISPs) and Managed Service Providers (MSPs). This highlights a critical aspect of the KEV catalog: the severity of a vulnerability doesn’t always align with its exposure or CVSS (Common Vulnerability Scoring System) score. Even vulnerabilities with low exposure can be highly damaging if leveraged in targeted attacks. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleNew HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits
    Next Article When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions

    Related Posts

    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    June 1, 2025
    Artificial Intelligence

    LWiAI Podcast #201 – GPT 4.5, Sonnet 3.7, Grok 3, Phi 4

    June 1, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    New Video Series: The Laravel Ecosystem

    Development

    OpenResearcher: An Open-Source Project that Harnesses AI to Accelerate Scientific Research

    Development

    Facteur is mail-merge software

    Linux

    Up and running with Apache OFBiz and Amazon Aurora DSQL

    Databases
    Hostinger

    Highlights

    Machine Learning

    VideoMind: A Role-Based Agent for Temporal-Grounded Video Understanding

    March 31, 2025

    LLMs have shown impressive capabilities in reasoning tasks like Chain-of-Thought (CoT), enhancing accuracy and interpretability…

    Google Cloud: Driving digital transformation

    May 29, 2025

    From Pause to Progress: CSS-Tricks’ 2024 Journey

    December 31, 2024

    The Good, the Bad and the Ugly in Cybersecurity – Week 22

    May 30, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.