CISA agrega una vulnerabilidad explotada conocida al catálogo

The Cybersecurity and Infrastructure Security Agency (CISA) has recently added a new vulnerability, identified as CVE-2024-3393, to its Known Exploited Vulnerabilities Catalog. This vulnerability pertains to malformed DNS packets in PAN-OS, the operating system developed by Palo Alto Networks. Such vulnerabilities are common vectors for cyberattacks and pose significant risks, particularly for federal agencies.

CISA’s Known Exploited Vulnerabilities Catalog serves as a dynamic list of Common Vulnerabilities and Exposures (CVE) that are actively being exploited in the wild. The establishment of this catalog is part of the Binding Operational Directive (BOD) 22-01, which was aimed at reducing the significant risks posed by known exploited vulnerabilities. BOD 22-01 mandates that federal civilian executive branch agencies (FCEB) address identified vulnerabilities by specified deadlines to safeguard their networks from active threats.

While BOD 22-01 specifically applies to FCEB agencies, CISA strongly encourages all organizations—regardless of their federal status—to minimize their exposure to cyberattacks. This can be achieved by prioritizing the timely remediation of vulnerabilities listed in the catalog as an essential part of their vulnerability management practices. CISA is committed to continuously updating the catalog by including vulnerabilities that meet the specified criteria for exploitation.

In summary, CVE-2024-3393 highlights a crucial issue regarding network security, emphasizing the need for constant vigilance and proactive measures in cybersecurity. Organizations must take these vulnerabilities seriously to protect both their systems and sensitive data from exploitative cyber threats.

Enlace de la fuente, haz clic para tener más información

Artículos y alertas de seguridad

Consultar más contenidos y alertas

Alertas y noticias de seguridad de la información

Contacta

Contacta con nosotros para obtener soluciones integrales en IT y seguridad de la información

Estamos encantados de responder cualquier pregunta que puedas tener, y ayudarte a determinar cuáles de nuestros servicios se adaptan mejor a tus necesidades.

Nuestros beneficios:
¿Qué sucede a continuación?
1

Programamos una llamada según tu conveniencia.

2

Realizamos una reunión de descubrimiento y consultoría.

3

Preparamos una propuesta.

Agenda una consulta gratuita