<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:"Segoe UI";
        panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
        {font-family:"Franklin Gothic Book";
        panose-1:2 11 5 3 2 1 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
p.paragraph, li.paragraph, div.paragraph
        {mso-style-name:paragraph;
        margin:0in;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
span.normaltextrun
        {mso-style-name:normaltextrun;}
span.eop
        {mso-style-name:eop;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<div>
<div>
<p class="paragraph" style="margin-right:3.0pt;background:white"><span class="eop"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
</div>
<div>
<p class="paragraph" style="margin-right:3.0pt;background:white"><span class="normaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">Today, CISA added a significant number of known exploited vulnerabilities to its
</span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif;color:black"><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank"><span class="normaltextrun"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif">catalog</span></span></a></span><span class="normaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">. CISA’s
 goal is to drive cybersecurity resources to fix the specific vulnerabilities that are actively exploited by nation-states and criminal groups in their attempts to compromise federal agencies, as well as U.S. critical infrastructure. These types of vulnerabilities
 are a frequent attack vector for malicious cyber actors of all types and pose significant risk to organizations of all sectors and sizes.</span></span><span class="eop"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
</div>
<div>
<p class="paragraph" style="background:white"><span class="eop"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
</div>
<div>
<p class="paragraph" style="background:white"><span class="normaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">This latest addition of nearly 100 vulnerabilities is in part an outcome of our deep, trusted, and ongoing operational
 collaboration with our federal, industry, and </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif;color:black"><a href="https://www.cisa.gov/jcdc" target="_blank"><span class="normaltextrun"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif">Joint
 Cyber Defense Collaborative</span></span></a></span><span class="normaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> (JCDC) partners to identify and publish information about vulnerabilities that are being actively exploited
 by significant adversaries. Recognizing the significant number of vulnerabilities included in this update, CISA recommends that organizations prioritize mitigations of those vulnerabilities that are accessible via the Internet, affect mission-critical assets,
 or cannot be mitigated by compensating controls.</span></span><span class="eop"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
<p class="paragraph" style="background:white;user-select:text;overflow-wrap:break-word;font-kerning:none">
<span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p> </o:p></span></p>
</div>
<div>
<p class="paragraph" style="background:white"><span class="normaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">CISA is leaning forward, sharing these
</span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif;color:black"><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank"><span class="normaltextrun"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif">new
 vulnerabilities</span></span></a></span><span class="normaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> quickly so our partners in the federal government and across critical infrastructure can take action and remain vigilant.
 As America’s cyber defense agency, this is a key part of our mission to help our critical infrastructure partners reduce their risk to exploitation by threat actors. At this time, we are asking all organizations to have their ‘</span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif;color:black"><a href="https://www.cisa.gov/shields-up" target="_blank"><span class="normaltextrun"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif">Shields
 Up’</span></span></a></span><span class="normaltextrun"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">. The patching and mitigating of known exploited vulnerabilities is a key step to reducing the risk or impact of malicious cyber
 activity. </span></span><span class="eop"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal" style="margin-bottom:12.0pt;user-select:text;overflow-wrap:break-word;font-kerning:none">
<o:p> </o:p></p>
<p class="MsoNormal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cyber Security Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt;color:#0563C1">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_1" src="cid:image001.png@01D82EE0.B72C85D0"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="paragraph" style="background:white"><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:12.0pt;color:black"><o:p> </o:p></span></p>
</div>
</body>
</html>