Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The U.S. CISA Catalog: A Comprehensive List of Known Exploited Vulnerabilities



The U.S. CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities catalog, highlighting the ongoing threats facing organizations in the digital landscape. The newly added vulnerabilities are related to Samsung's MagicINFO 9 Server, SimpleHelp, and D-Link DIR-823X devices. CISA emphasizes the importance of addressing these vulnerabilities as soon as possible to mitigate significant risks to federal agencies and private organizations alike.

  • The United States Cybersecurity and Infrastructure Security Agency (CISA) has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.
  • CVE-2024-7399 in Samsung MagicINFO 9 Server allows for system-level access through input validation flaws, rated as high risk with a CVSS score of 8.8.
  • CVE-2024-57726 and CVE-2024-57728 in SimpleHelp allow escalation to full server admin access and potential remote code execution, both rated as high risk.
  • CVE-2025-29635 in D-Link DIR-823X devices allows command injection due to poor validation, which has been exploited by a Mirai botnet.



  • The United States Cybersecurity and Infrastructure Security Agency (CISA) has recently added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, which is a list of publicly disclosed vulnerabilities that have been exploited in the wild. The newly added vulnerabilities are related to Samsung's MagicINFO 9 Server, SimpleHelp, and D-Link DIR-823X devices.

    According to CISA, the CVE-2024-7399 vulnerability in Samsung MagicINFO 9 Server allows an attacker to exploit a flaw in input validation, which can be used to upload JSP files and execute code with system-level access. This vulnerability has been rated as high risk by CISA, with a CVSS score of 8.8.

    The CVE-2024-57726 vulnerability in SimpleHelp is related to an authorization issue, which allows low-privileged technicians to generate API keys with elevated rights, enabling escalation to full server admin access. This vulnerability has also been rated as high risk by CISA, with a CVSS score of 9.9.

    The CVE-2024-57728 vulnerability in SimpleHelp is a path traversal issue that allows admin users to upload crafted ZIP files that place arbitrary files on the system, potentially leading to remote code execution as the SimpleHelp server user. This vulnerability has been rated as high risk by CISA, with a CVSS score of 7.2.

    The CVE-2025-29635 vulnerability in D-Link DIR-823X devices allows attackers to inject commands because an attacker-controlled value is copied without proper validation. This vulnerability has been reported to be exploited by a Mirai botnet.

    CISA has emphasized the importance of addressing these vulnerabilities as soon as possible, as they pose significant risks to federal agencies and private organizations alike. The agency has ordered federal agencies to fix these vulnerabilities by May 8, 2026.

    Experts have highlighted the need for organizations to review their infrastructure and address these vulnerabilities proactively. With the increasing sophistication and frequency of cyber attacks, it is essential for organizations to stay vigilant and proactive in protecting their networks against known exploited vulnerabilities.

    The CISA catalog serves as a valuable resource for organizations looking to identify and mitigate potential security risks. By staying informed about known exploited vulnerabilities, organizations can take steps to protect themselves against the latest threats.

    Furthermore, the addition of these new vulnerabilities highlights the importance of responsible disclosure and the role that researchers play in identifying and reporting vulnerabilities. The public release of proof-of-concept (PoC) exploit code for CVE-2024-7399 may have contributed to its rapid exploitation, emphasizing the need for organizations to prioritize vulnerability patching and mitigation.

    In conclusion, the recent addition of these three new vulnerabilities to the CISA catalog serves as a reminder of the ongoing threats facing organizations in the digital landscape. By prioritizing vulnerability patching, proactive security measures, and responsible disclosure, organizations can mitigate these risks and stay ahead of emerging threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-US-CISA-Catalog-A-Comprehensive-List-of-Known-Exploited-Vulnerabilities-ehn.shtml

  • https://securityaffairs.com/191281/security/u-s-cisa-adds-simplehelp-samsung-and-d-link-flaws-to-its-known-exploited-vulnerabilities-catalog.html

  • https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html

  • https://www.abhs.in/blog/cisa-kev-simplehelp-samsung-magicinfo-dlink-dragonforce-ransomware-april-2026

  • https://nvd.nist.gov/vuln/detail/CVE-2024-7399

  • https://www.cvedetails.com/cve/CVE-2024-7399/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-57726

  • https://www.cvedetails.com/cve/CVE-2024-57726/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-57728

  • https://www.cvedetails.com/cve/CVE-2024-57728/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-29635

  • https://www.cvedetails.com/cve/CVE-2025-29635/


  • Published: Sat Apr 25 17:40:14 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us