US CISA Adds Linux Kernel Flaws to Its Known Exploited Vulnerabilities Catalog
U.S. CISA Adds Linux Kernel Flaws to Its Known Exploited Vulnerabilities Catalog
The United States Cybersecurity and Infrastructure Security Agency (CISA) has added several Linux kernel flaws to its Known Exploited Vulnerabilities (KEV) catalog. The move is aimed at prompting affected organizations to patch the vulnerabilities and mitigate potential attacks.
The KEV catalog is a list of identified vulnerabilities that are known to be exploited by attackers. The addition of the Linux kernel flaws brings the total number of vulnerabilities in the catalog to over 300.
The Linux kernel flaws added to the catalog include several high-severity vulnerabilities with CVSS scores of 7.5 or higher. The most severe of these is CVE-2022-2035, a flaw in the Linux kernel's TCP/IP implementation that can be exploited to gain arbitrary code execution.
The other Linux kernel flaws added to the catalog include CVE-2022-2036, CVE-2022-2037, and CVE-2022-2038. These flaws can be exploited to gain elevated privileges, crash the system, or execute arbitrary code.
CISA's move is aimed at encouraging affected organizations to patch the vulnerabilities and reduce the risk of attacks. The agency notes that the vulnerabilities are known to be exploited in the wild, and that unpatched systems are at risk of being compromised.
Organizations that have not yet patched the vulnerabilities are advised to take immediate action to do so. CISA provides guidance on how to patch the vulnerabilities and recommends that organizations use reputable antivirus software and firewalls to help detect and prevent attacks.
The addition of the Linux kernel flaws to the KEV catalog is the latest in a series of moves by CISA to prioritize vulnerability management and reduce the risk of attacks. The agency's efforts are aimed at protecting critical infrastructure and reducing the risk of cyber attacks on the nation's digital assets.