• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security

This CISA Resource Can Help Protect You From Actively Exploited Bugs

CISA has added 15 new actively exploited bugs to its catalog of known exploited vulnerabilities that all organizations should patch.

February 14, 2022 Zachary Comeau Leave a Comment

CISA Software Security
Tada Images/ Stock.adobe.com

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been extremely active in helping both the public sector and private sector respond to cybersecurity threats, and is often one of the leading voices when new threats emerge.

The agency, part of DHS, has released guides, advisories and other resources on current and historical threats, and its activity has increased significantly over the last few years. That includes regularly updating its database of known exploited vulnerabilities, the latest of which came late last week.

CISA added 15 security bugs that are being actively exploited, including in Microsoft, Apache, Oracle, Apple, D-Link and Jenkins products. The majority of the newly disclosed bugs being actively exploited are several years old, which highlights the importance of quickly patching software vulnerabilities as patches become available.

Federal agencies are instructed to patch the most recent vulnerability, a local privilege escalation bug in Windows SAM, by Feb. 24. The flaw, tracked as CVE-2021-36934, could allow an attacker to run arbitrary code with SYSTEM privileges. Microsoft issued a patch for this vulnerability in August.

For the other 14 known exploited vulnerabilities added to CISA’s list, federal agencies have until Aug. 10 to fix the vulnerabilities, the oldest of which is an Apple bug from 2014.

The agency has been maintaining the list since November, and has already added more than 360 entries.

According to the agency, the entries are based on evidence that threat actors are actively exploiting the vulnerabilities and are using them as a frequent attack vector for malicious activities of all types.

CISA’s catalog of known exploited vulnerabilities launched on Nov. 3 as part of the agency’s Binding Operational Director (BOD) 22-01 designed to require federal civilian agencies to remediate vulnerabilities within specific timeframes.

CISA Director Jen Easterly said in November that threat actors are using these vulnerabilities to target federal agencies, but urged every organization to mitigate these actively exploited bugs.

“While this Directive applies to federal civilian agencies, we know that organizations across the country, including critical infrastructure entities, are targeted using these same vulnerabilities,” Easterly said. “It is therefore critical that every organization adopt this Directive and prioritize mitigation of vulnerabilities listed in CISA’s public catalog.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: CISA, Patch management, Vulnerabilities

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Software License Spending, SaaS, cloud apps Your Guide to Choosing the Best Cloud Security…
  • IT Budget 2025 Budgeting Tips for IT Pros/CIOs in 2025
  • A close-up of a technician’s hands typing and navigating through troubleshooting steps on a computer in a well-lit office. , natural light, soft shadows, with copy space Five Ways to Reduce Desktop Support Troubleshooting Time

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.