CISA Adds Cisco, Hitachi, Microsoft Exploited Vulnerabilities to Catalog, Urges Remediation

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

Cisco, Hitachi, Microsoft, and Progress vulnerabilities under active exploitation were added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. 

The update, announced on March 3, includes critical flaws affecting widely used systems, emphasizing significant risks to federal enterprise networks and broader organizational infrastructures.

These vulnerabilities are frequent targets for cyber actors due to their widespread use and potential for exploitation, posing immediate threats to affected systems.

The updates align with Binding Operational Directive (BOD) 22-01, which requires Federal Civilian Executive Branch (FCEB) agencies to remediate vulnerabilities identified in the catalog by set deadlines. 

BOD 22-01, introduced to mitigate risks associated with exploited vulnerabilities, mandates proactive remediation to safeguard federal networks from active cyber threats.

While the directive primarily applies to FCEB agencies, CISA strongly encourages all organizations to prioritize addressing these vulnerabilities as part of their cybersecurity strategies.

CISA advises businesses and institutions to integrate regular Catalog reviews and timely remediation efforts into their vulnerability management practices to minimize exposure to cyberattacks. The agency will continue to update the catalog as additional exploited vulnerabilities are identified.

Three new vulnerabilities affecting Mitel MiCollab and Oracle WebLogic Server were flagged under active exploitation in January: CVE-2024-41713, CVE-2024-55550, and CVE-2020-2883.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: