Urgent: Three New Vulnerabilities in CISA's Exploited Catalog You Must Address

  • Thread Author
In the latest cybersecurity bulletin from the Cybersecurity and Infrastructure Security Agency (CISA), three alarming vulnerabilities have been added to the Known Exploited Vulnerabilities Catalog. If you didn’t already have enough reasons to keep your systems patched and your cybersecurity hygiene in check, here comes another wake-up call. Let’s break down what these vulnerabilities mean—and why you should care.

The Villains: New CVEs to Watch​

CISA flagged three vulnerabilities, citing active exploitation by threat actors:
  1. CVE-2024-44308 (Apple Multiple Products Code Execution Vulnerability):
    This vulnerability allows attackers to execute arbitrary code on affected Apple devices. This means your iPhone, Mac, or iPad could become a hacker's playground if exploited. A malicious actor could potentially take full control of the device, injecting malware, exfiltrating sensitive user data, or even making the device unusable.
  2. CVE-2024-44309 (Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability):
    Cross-Site Scripting vulnerabilities are a favorite among cybercriminals. This XSS vulnerability targets Apple ecosystems, enabling attackers to manipulate web applications and steal sensitive tokens, authentication cookies, or even impersonate users on affected devices.
  3. CVE-2024-21287 (Oracle Agile PLM Incorrect Authorization Vulnerability):
    Affecting Oracle's Agile Product Lifecycle Management (PLM), this vulnerability improperly authorizes users, potentially allowing cyber actors to access unauthorized parts of the system—think high-stakes corporate espionage. This is particularly dangerous for organizations relying on Agile PLM to track critical product data or developmental projects.
Why These Matter:
Attackers are already exploiting these vulnerabilities in the wild, meaning they aren’t just theoretical threats. They have been weaponized, and organizations globally may already be under siege.

The Bigger Picture: Known Exploited Vulnerabilities Catalog​

You’ve undoubtedly heard of the Known Exploited Vulnerabilities Catalog, which is exactly what it sounds like: a “greatest hits” list of CVEs being actively exploited in the real world. Think of it as CISA’s way of saying, “If you ignore this list, it’s on you when you get hacked.”
The Catalog was established under Binding Operational Directive (BOD) 22-01, which mandates all Federal Civilian Executive Branch (FCEB) agencies to remediate listed vulnerabilities promptly. While aimed specifically at FCEB networks, CISA encourages all organizations—private or public—to treat the catalog as their go-to checklist for reducing exposure to threats.
Fun Fact: BOD 22-01 made the Catalog a “living document,” meaning that it's constantly updated as new exploited vulnerabilities are discovered.

Why You Should Act​

1. Security Isn’t Optional

Ignoring these vulnerabilities doesn’t just put you at risk; it actively invites attackers in. Apple users should patch their devices ASAP (keep an eye on operating system updates). Likewise, Oracle users should coordinate with IT teams to apply the latest patches to their Agile PLM systems.

2. Attack Surface Shrinkage

By staying on top of these cataloged flaws, you're significantly reducing the "attack surface" or the number of exploitable points in your system. Prioritize these vulnerabilities as part of your organizational patch management practices.

3. Industry Implications

Even if your organization doesn’t use the impacted Apple or Oracle products directly, supply chain dependencies mean the buck doesn't necessarily stop there. Vendors, partners, and third-party collaborators who haven't patched these vulnerabilities could provide unintended entry points to criminals.

Palo Alto's Tie-In: Operation Lunar Peek​

CISA’s advisory also recommends taking a closer look at Palo Alto Networks' "Operation Lunar Peek," which outlines tactics utilized by sophisticated attackers to exploit CVEs like CVE-2024-0012 and CVE-2024-9474. In case you’re wondering how malicious campaigns play out, consider these cases a spotlight on how a seemingly “average” vulnerability becomes a launchpad for devastating cyber incidents.
Some takeaways from Lunar Peek include:
  • Attackers leveraging poor patching practices.
  • Gaping holes in endpoint security making sophisticated data exfiltration possible.
  • The need for multi-layered defenses, such as combining firewalls, endpoint detection, and robust identity/access management policies.
If this doesn’t emphasize why timely vulnerability remediation is critical, nothing will.

Windows Users: What's Relevant?​

For our WindowsForum.com users—you might be wondering whether this applies to you. After all, these vulnerabilities target Apple and Oracle products, right? Yes, but there’s no room for complacency. Here's how to think about it:

Inter-connected Systems

If you use devices like iPhones or iPads alongside your Windows environment, the vulnerabilities could become entry points into your corporate or personal networks. A smartphone compromise could lead to pivoting into your Windows servers or endpoints.

Supply Chains & Vendors

Oracle’s Agile PLM is widely used in manufacturing and supply chain management. If a key supplier or partner is compromised, your systems may indirectly be at risk due to shared access or data intersections.

How to Stay Safe

Stay updated on CISA vulnerabilities, even those that are not Windows-specific. Knowledge is power! Use patch management tools like WSUS (Windows Server Update Services) or third-party alternatives to automate patching across diverse environments in your organization.

Moving Forward​

The message here is loud and clear: Cybersecurity isn’t just for IT professionals or government agencies—it’s a shared responsibility. If these vulnerabilities don’t impact you directly, they very well could affect a supplier, vendor, or partner, making everyone a potential target in today's hyper-connected landscape.
Treat CISA’s catalog like a to-do list where procrastination could cost you dearly. Next steps? Apple and Oracle users, patch those systems ASAP. Windows users? Learn from this playbook and ensure your house is in order.
Have thoughts or questions about managing vulnerabilities and cybersecurity hygiene? Drop them below and let’s keep the conversation going.

Source: CISA CISA Adds Three Known Exploited Vulnerabilities to Catalog