The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog, adding several critical vulnerabilities that pose significant risks to both public and private sectors. The latest additions include flaws in Microsoft Windows and Rejetto HTTP File Server, which have been identified as high-priority threats.

Newly Added Vulnerabilities

The newly added vulnerabilities are:

  • CVE-2024-23692: This vulnerability, with a CVSS score of 9.8, affects Rejetto HTTP File Server up to version 2.3m. It is a template injection flaw that allows remote, unauthenticated attackers to execute arbitrary commands on the affected system by sending specially crafted HTTP requests.
  • CVE-2024-38080: With a CVSS score of 7.8, this elevation of privilege vulnerability impacts Windows Hyper-V. Successful exploitation could enable attackers to gain SYSTEM privileges.
  • CVE-2024-38112: This Windows MSHTML Platform Spoofing Vulnerability has a CVSS score of 7.5. Exploiting this flaw requires attackers to take additional preparatory actions before sending a malicious file to victims, who would then need to execute it.

The inclusion of these vulnerabilities in the KEV catalog underscores their potential for exploitation and the urgency for remediation.

Implications for Federal and Private Sectors

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, Federal Civilian Executive Branch (FCEB) agencies are mandated to address these vulnerabilities by the specified due date to safeguard their networks. CISA has set a deadline of July 30, 2024, for federal agencies to fix these vulnerabilities.

Private organizations are also strongly advised to review the KEV catalog and address these vulnerabilities within their infrastructure. Failure to do so could leave critical systems exposed to potential attacks, leading to severe operational disruptions and data breaches.

Recent Additions and Expert Recommendations

Last week, CISA added another critical vulnerability to its KEV catalog: the Cisco NX-OS Command Injection Vulnerability (CVE-2024-20399). This addition highlights the ongoing efforts by CISA to keep the KEV catalog updated with the most pressing cybersecurity threats.

Cybersecurity experts recommend that both public and private entities prioritize the remediation of these vulnerabilities. Regularly updating security protocols and conducting thorough vulnerability assessments can significantly reduce the risk of exploitation.

For more updates on cybersecurity threats and best practices, follow Pierluigi Paganini on Twitter: @securityaffairs, Facebook, and Mastodon.

What is the difference between microsoft windows 11 home and pro?

The primary differences between Microsoft Windows 11 Home and Pro include features related to business and security. Windows 11 Pro offers advanced features such as BitLocker device encryption, remote desktop access, Hyper-V for virtualization, and enhanced security through Windows Information Protection. Additionally, Windows 11 Pro supports joining a domain or Azure Active Directory, essential for enterprise environments, whereas Windows 11 Home is tailored more for consumer use.

What are examples of rbac as used in microsoft windows?

Role-Based Access Control (RBAC) in Microsoft Windows is used to restrict system access to authorized users. Examples include setting up Active Directory roles such as 'Domain Administrator,' 'Account Operator,' and 'Backup Operator,' which grant varying levels of permissions based on the role assigned. Users can also be assigned specific permissions for file and folder access through NTFS permissions, enabling fine-grained control over user activities and access to resources in a Windows environment.
Discover Microsoft Windows XP

Discover Microsoft Windows XP download for free to PC or mobile

Latest update Discover Microsoft Windows XP download for free for Windows PC or Android mobile

3
661 reviews
3953 downloads

News and reviews about Discover Microsoft Windows XP

13 Nov 2025

Windows AI Vision Sparks User Backlash at Microsoft

Microsoft's AI vision for Windows, shared by Pavan Davuluri, faces user backlash, highlighting concerns over AI prioritization.

Read more

12 Nov 2025

Microsoft's Windows to Integrate More AI Features

Windows to become more 'agentic' with AI integration, says Microsoft. The change draws criticism on social media.

Read more

12 Nov 2025

Patch Resolves Windows Kernel Vulnerability

Microsoft issues critical update for Windows Kernel due to active vulnerability exploitation. Immediate update advised for Windows 10 and 11 users.

Read more

12 Nov 2025

Microsoft Fixes Zero-Day Vulnerability in Patch Tuesday Updates

Patch Tuesday sees crucial fixes for Windows zero-day threats, enhancing system security.

Read more

12 Nov 2025

Microsoft Patch Tuesday Fixes 63 Vulnerabilities

On 2025-11-12, Microsoft addressed 63 security flaws in its software, including a critical Windows Kernel zero-day vulnerability.

Read more

23 Oct 2025

Patch SMB Vulnerability to Protect Older Windows Systems

CVE-2025-33073, a severe SMB flaw impacting older Windows, urges immediate updates for SMB security.

Read more

21 Oct 2025

Prioritize CVE-2025-33073 Patch for Windows Users

Windows users urged to update for CVE-2025-33073. This vulnerability affects Server, 10, 11, necessitating quick action to avoid privilege escalation.

Read more

17 Oct 2025

CISA Adds Key Software Flaws to Exploited Vulnerabilities List

CISA updates KEV catalog with vulnerabilities found in several software, urging federal agencies to fix by 2025-11-04.

Read more

15 Oct 2025

October Patch Tuesday Fixes 167 Vulnerabilities Including Critical RCE

Microsoft's October Patch Tuesday addresses 167 vulnerabilities, including critical RCE flaws in WSUS and Microsoft Office.

Read more

05 Oct 2025

How to Recover Files and Folders Hidden by Virus in Windows XP

Learn how to recover files and folders hidden by a virus in Windows XP. Discover Microsoft Windows XP for effective solutions.

Read more