{"id":12148,"date":"2022-12-09T06:03:09","date_gmt":"2022-12-09T13:03:09","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=patch_watch&p=12148"},"modified":"2023-02-17T13:32:39","modified_gmt":"2023-02-17T20:32:39","slug":"dhs-cisa-kevs-weekly-edition-24-patch-before-you-hit-the-deadline","status":"publish","type":"patch_watch","link":"https:\/\/webdev.securin.xyz\/patch_watch\/dhs-cisa-kevs-weekly-edition-24-patch-before-you-hit-the-deadline\/","title":{"rendered":"DHS CISA KEVs Weekly Edition 24: Patch Before You Hit the Deadline"},"content":{"rendered":"
Recently, hackers have actively been exploiting zero-day vulnerabilities. The CISA is much more proactive in adding such vulnerabilities to the KEV catalog and recommending that organizations patch them on priority. In this post, we shall analyze the CVEs that have been prioritized for patching on December 9, 2022.<\/p>\n
<\/p>\n
From our analysis, we found that<\/p>\n
All 5 vulnerabilities are trending this month.<\/p>\n<\/li>\n
CVE-2022-41049<\/a> is the second Mark-of-the-Web vulnerability that was exploited along with CVE-2022-41049. This allows attackers to download and execute malicious files without issuing a warning to the user. This is exploited by several ransomware groups (LockBit, BlackBasta, Magniber).<\/p>\n<\/li>\n CVE-2022-41073<\/a> is a Microsoft Windows Print Spooler vulnerability which allows an attacker to gain root privileges.<\/p>\n<\/li>\n