<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Segoe UI";
panose-1:2 11 5 2 4 2 4 2 2 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal" style="vertical-align:baseline"><img width="602" height="153" style="width:6.2708in;height:1.5902in" id="Picture_x0020_1" src="cid:image001.png@01D7EDE0.A275B800"><span style="font-size:12.0pt;font-family:"Times New Roman",serif"> </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-size:12.0pt;font-family:"Times New Roman",serif"> </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-size:12.0pt;font-family:"Times New Roman",serif">CISA has updated </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank"><span style="font-size:12.0pt;font-family:"Times New Roman",serif;color:#6888C9">the
known exploited vulnerabilities catalog</span></a></span><span style="font-size:12.0pt;font-family:"Times New Roman",serif"> based on reliable evidence that threat actors are actively using these vulnerabilities to exploit public or private organizations. </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-size:12.0pt;font-family:"Times New Roman",serif"> </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-size:12.0pt;font-family:"Times New Roman",serif">The catalog update reflects the following additions: </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-size:12.0pt;font-family:"Times New Roman",serif"> </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<table class="MsoNormalTable" border="1" cellspacing="0" cellpadding="0" width="479" style="width:359.25pt;background:white;border-collapse:collapse">
<tbody>
<tr style="height:15.0pt">
<td width="142" valign="top" style="width:106.5pt;border:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><b>CVE Number</b><span style="color:black"> </span><o:p></o:p></p>
</td>
<td width="337" valign="top" style="width:252.75pt;border:solid windowtext 1.0pt;border-left:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><b><span style="color:black">CVE Title</span></b><span style="color:black"> </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" target="_blank">CVE-2021-44228</a> </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Apache Log4j2 Remote Code Execution </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">CVE-2021-44515 </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Zoho Corp. Desktop Central Authentication Bypass Vulnerability </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">CVE-2021-44168 </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Fortinet FortiOS Arbitrary File Download </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35394" target="_blank">CVE-2021-35394</a> </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Realtek Jungle SDK Remote Code Execution </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8816" target="_blank">CVE-2020-8816</a> </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Pi-Hole AdminLTE Remote Code Execution </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17463" target="_blank">CVE-2020-17463</a> </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Fuel CMS SQL Injection Vulnerability </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black"><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-7238" target="_blank">CVE-2019-7238</a> </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Sonatype Nexus Repository Manager Incorrect Access Control Vulnerability </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black"><a href="https://nvd.nist.gov/vuln/detail/cve-2019-13272" target="_blank">CVE-2019-13272</a> </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Linux Kernel Improper Privilege Management Vulnerability </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black"><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10758" target="_blank">CVE-2019-10758</a> </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">MongoDB mongo-express Remote Code Execution </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black"><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-0193" target="_blank">CVE-2019-0193</a> </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Apache Solr DataImportHandler Code Injection Vulnerability </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black"><a href="https://nvd.nist.gov/vuln/detail/cve-2017-17562" target="_blank">CVE-2017-17562</a> </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Embedthis GoAhead Remote Code Execution </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black"><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-12149" target="_blank">CVE-2017-12149</a> </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Red Hat Jboss Application Server Remote Code Execution </span><o:p></o:p></p>
</td>
</tr>
<tr style="height:15.0pt">
<td width="142" valign="bottom" style="width:106.5pt;border:solid windowtext 1.0pt;border-top:none;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black"><a href="https://nvd.nist.gov/vuln/detail/CVE-2010-1871" target="_blank">CVE-2010-1871</a> </span><o:p></o:p></p>
</td>
<td width="337" valign="bottom" style="width:252.75pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in 0in 0in 0in;height:15.0pt">
<p class="MsoNormal" style="vertical-align:baseline"><span style="color:black">Red Hat Linux JBoss Seam 2 Remote Code Execution </span><o:p></o:p></p>
</td>
</tr>
</tbody>
</table>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-size:12.0pt;font-family:"Times New Roman",serif"><o:p> </o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-size:12.0pt;font-family:"Times New Roman",serif"> </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-size:12.0pt;font-family:"Times New Roman",serif">Please see the helpful link below: </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><a href="https://www.cisa.gov/known-exploited-vulnerabilities" target="_blank"><span style="font-size:12.0pt;font-family:"Times New Roman",serif">Sign up
for automated alerts anytime a vulnerability is added.</span></a></span><span style="font-size:12.0pt;font-family:"Times New Roman",serif"> </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-size:12.0pt;font-family:"Times New Roman",serif"> </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><i><span style="font-size:12.0pt;font-family:"Times New Roman",serif">Please contact CISA (via the reporting </span></i><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><a href="https://us-cert.cisa.gov/report" target="_blank"><i><span style="font-size:12.0pt;font-family:"Times New Roman",serif;color:windowtext">portal</span></i></a></span><i><span style="font-size:12.0pt;font-family:"Times New Roman",serif"> or
by phone at 1-888-282-0870) to report an intrusion or to request either technical assistance or additional resources for incident response. </span></i><span style="font-size:12.0pt;font-family:"Times New Roman",serif"> </span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-size:12.0pt;font-family:"Times New Roman",serif"> <o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cyber Security Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_3" src="cid:image002.png@01D7EDDC.4526AEB0"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal" style="vertical-align:baseline"><o:p> </o:p></p>
</div>
</body>
</html>