{"id":3572,"date":"2025-03-19T21:49:44","date_gmt":"2025-03-19T21:49:44","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3572"},"modified":"2025-03-19T21:49:48","modified_gmt":"2025-03-19T21:49:48","slug":"cisa-tilfojer-tre-nye-sarbarheder-til-deres-liste-over-de-farligste-det-skal-du-vide","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/da\/nyheder\/cisa-tilfojer-tre-nye-sarbarheder-til-deres-liste-over-de-farligste-det-skal-du-vide\/","title":{"rendered":"CISA tilf\u00f8jer tre nye s\u00e5rbarheder til deres \"farligste\" liste: Hvad du skal vide"},"content":{"rendered":"<p>Agenturet for cybersikkerhed og infrastruktursikkerhed (CISA) har netop offentliggjort det seneste KEV-katalog (Known Exploited Vulnerabilities) med tre nye sikkerhedssvagheder, som hackere i \u00f8jeblikket udnytter til at hacke sig ind i systemer. Betydningen af denne meddelelse er baseret p\u00e5 det faktum, at CISA's advarsler ikke indikerer en eller anden form for teoretisk situation - disse s\u00e5rbarheder er konkrete i den forstand, at de faktisk bliver udnyttet til reelle angreb.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-was-added\"><strong>Hvad blev der tilf\u00f8jet?<\/strong><\/h2>\n\n\n<p>Lad os overs\u00e6tte disse tre s\u00e5rbarheder til hverdagssprog:<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"1-edimax-ip-camera-vulnerability-cve20251316\"><strong>1. S\u00e5rbarhed i Edimax IP-kamera (CVE-2025-1316)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg\" alt=\"S\u00e5rbarhed i Edimax IP-kamera\" class=\"wp-image-3574\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Det n\u00e6vnte sikkerhedsproblem i <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1316\">Edimax IC-7100 sikkerhedskameraer<\/a> refererer til den s\u00e5kaldte \"command injection\". Ideen er, at angribere kan f\u00e5 kameraet til at udf\u00f8re skadelig kode. N\u00e5r disse kameraer er sat op i hjemmet eller p\u00e5 kontoret, kan de blive angrebet af uautoriserede brugere, som kan f\u00e5 adgang til dine kamerafeeds, \u00e6ndre indstillinger eller bruge disse kameraer til at angribe andre enheder p\u00e5 dit netv\u00e6rk.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"2-nakivo-backup-software-vulnerability-cve202448248\"><strong>2. S\u00e5rbarhed i NAKIVO Backup-software (CVE-2024-48248)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg\" alt=\"S\u00e5rbarhed i NAKIVO Backup-software\" class=\"wp-image-3575\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.nakivo.com\/\">NAKIVO<\/a> udvikler backup- og gendannelsesl\u00f8sninger, som bruges af mange virksomheder til at sikre databeskyttelse. Den p\u00e5g\u00e6ldende fejl kaldes \"<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/36.html\">Gennemgang af absolut sti<\/a>\", som giver angribere mulighed for at f\u00e5 adgang til filer, de ikke burde se. Dette er s\u00e6rligt risikabelt i forbindelse med backup-software, hvor backups ofte indeholder f\u00f8lsomme data. Ubudne g\u00e6ster, der kompromitterer denne s\u00e5rbarhed, kan muligvis f\u00e5 adgang til, stj\u00e6le eller slette de sikkerhedskopierede data.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"3-sap-netweaver-vulnerability-cve201712637\"><strong>3. SAP NetWeaver-s\u00e5rbarhed (CVE-2017-12637)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg\" alt=\"S\u00e5rbarhed i SAP NetWeaver\" class=\"wp-image-3576\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Dette er s\u00e6rligt kritisk, da det kom i 2017, hvilket er ret lang tid siden - det er n\u00e6sten otte \u00e5r. SAP NetWeaver er en af de teknologiplatforme, der udf\u00f8rer forskellige kritiske forretningsapplikationer. Det hul er pr\u00e6cis den slags ting, der ville g\u00f8re en \"<a href=\"https:\/\/portswigger.net\/web-security\/file-path-traversal\">Gennemgang af mapper<\/a>\", hvor ubudne g\u00e6ster p\u00e5 grund af den kunne f\u00e5 fat i filer og mapper, der ikke var tilladt. Det faktum, at mange systemer ikke er p\u00e5virket af patchen, selv efter s\u00e5 mange \u00e5r, er grunden til, at angriberne nu udnytter den.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-this-matters-to-everyone\"><strong>Hvorfor dette er vigtigt for alle<\/strong><\/h2>\n\n\n<p>Selvom CISA's retningslinjer kun er obligatoriske for f\u00f8derale myndigheder, er deres KEV-katalog den mest opdaterede kilde til at v\u00e6lge de mest afg\u00f8rende fejl, der skal rettes. N\u00e5r en fejl er med p\u00e5 denne liste, betyder det f\u00f8lgende:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hackere bruger disse s\u00e5rbarheder<\/li>\n\n\n\n<li>Angrebene er s\u00e5 succesfulde, at de allerede er kommet til det nationale niveau<\/li>\n\n\n\n<li>Den potentielle skade fra disse s\u00e5rbarheder er betydelig<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-should-you-do\"><strong>Hvad skal du g\u00f8re?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"for-home-users\"><strong>Til hjemmebrugere:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Hvis du har Edimax-kameraer, skal du tjekke producentens hjemmeside for at se, om de har udsendt firmwareopdateringer<\/li>\n\n\n\n<li>S\u00f8rg for, at dine enheder har alle de n\u00f8dvendige sikkerhedsopdateringer<\/li>\n\n\n\n<li>T\u00e6nk over de helt nye, gamle enheder, der sandsynligvis ikke l\u00e6ngere f\u00e5r sikkerhedsopdateringerne<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-business-users\"><strong>Til forretningsbrugere:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Medtag i din opg\u00f8relse, hvilke ber\u00f8rte produkter (Edimax-kameraer, NAKIVO-backup-software eller SAP NetWeaver) din organisation bruger.<\/li>\n\n\n\n<li>S\u00e6t patching af disse systemer \u00f8verst p\u00e5 din to-do-liste<\/li>\n\n\n\n<li>Hvis du ikke kan installere patchen med det samme, b\u00f8r du fors\u00f8ge at minimere den potentielle skade ved at isolere resten af netv\u00e6rket ved hj\u00e6lp af netv\u00e6rkssegmentering.<\/li>\n\n\n\n<li>Gennemg\u00e5 dine backup-rutiner for at sikre, at du har uinficerede kopier, der kan gendannes i tilf\u00e6lde af et brud.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-it-professionals\"><strong>For it-professionelle:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Udnyt fordelene ved <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">KEV-katalog af CISA<\/a>som praktisk talt er et scorekort for dit s\u00e5rbarhedsstyringsprogram<\/li>\n\n\n\n<li>Glem ikke gamle systemer, der m\u00e5ske k\u00f8rer for\u00e6ldede versioner af SAP NetWeaver-platformen under opdateringen.<\/li>\n\n\n\n<li>M\u00e5ske vil du g\u00e5 s\u00e5 langt som til at udf\u00f8re hyppigere s\u00e5rbarhedsscanning for de meget vigtige systemer<\/li>\n\n\n\n<li>I s\u00e5 fald skal du lynhurtigt l\u00e6gge en plan for, hvordan du h\u00e5ndterer de mest kritiske situationer, mens de stadig er i nuet.<\/li>\n<\/ul>\n\n\n\n<p>Eksemplet med en s\u00e5rbarhed for 8 \u00e5r siden er en god lektion til at forst\u00e5, at processen med at <a href=\"https:\/\/securitybriefing.net\/da\/ai-en-executive-architects-tilgang-til-finops-hvordan-ai-og-automatisering-effektiviserer-datastyring-oktober-2024-%c2%b7-cesar-daniel-barreto\/cybersikkerhed\/\">cybersikkerhed <\/a>er uendelig. Der er mange virksomheder, der stadig bruger \u00e6ldre software, som kan have velkendte s\u00e5rbarheder, og det f\u00f8rer til, at angriberne f\u00e5r et problem i vejen. Derfor er det n\u00f8dvendigt med regelm\u00e6ssige opdateringer af software og systemer samt patches og sikkerhedsvurderinger, der kan udf\u00f8res for de fungerende maskiner.<\/p>\n\n\n\n<p>Husk, at n\u00e5r CISA opdaterer sit KEV-katalog, er det ikke bare endnu en svaghed - det er faktisk et sikkerhedshul, som angribere i h\u00f8j grad bruger i \u00f8jeblikket til at inficere og stj\u00e6le data. V\u00e6r hurtig, og v\u00e6r en del af en ny administration, der ikke f\u00e5r problemer p\u00e5 grund af et malware-brud.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and Infrastructure Security Agency (CISA) har netop offentliggjort det seneste KEV-katalog (Known Exploited Vulnerabilities) med tre nye sikkerhedssvagheder, som hackere i \u00f8jeblikket udnytter til at hacke sig ind i systemer.... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/da\/nyheder\/cisa-tilfojer-tre-nye-sarbarheder-til-deres-liste-over-de-farligste-det-skal-du-vide\/\">Read more <span class=\"screen-reader-text\">CISA tilf\u00f8jer tre nye s\u00e5rbarheder til deres \"farligste\" liste: Hvad du skal vide<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3573,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-3572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/da\/nyheder\/cisa-tilfojer-tre-nye-sarbarheder-til-deres-liste-over-de-farligste-det-skal-du-vide\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; L\u00e6s mere CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/da\/nyheder\/cisa-tilfojer-tre-nye-sarbarheder-til-deres-liste-over-de-farligste-det-skal-du-vide\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T21:49:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T21:49:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"966\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"wordCount\":757,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"name\":\"CISA Adds Three New Vulnerabilities to Their \\\"Most Dangerous\\\" List: What You Need to Know | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"width\":966,\"height\":425,\"caption\":\"CISA Adds Three New Vulnerabilities to Their Most Dangerous List\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA tilf\u00f8jer tre nye s\u00e5rbarheder til deres \"mest farlige\" liste: Hvad du beh\u00f8ver at vide | Sikkerhedsbriefing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/da\/nyheder\/cisa-tilfojer-tre-nye-sarbarheder-til-deres-liste-over-de-farligste-det-skal-du-vide\/","og_locale":"da_DK","og_type":"article","og_title":"CISA Adds Three New Vulnerabilities to Their \"Most Dangerous\" List: What You Need to Know | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; L\u00e6s mere CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","og_url":"https:\/\/securitybriefing.net\/da\/nyheder\/cisa-tilfojer-tre-nye-sarbarheder-til-deres-liste-over-de-farligste-det-skal-du-vide\/","og_site_name":"Security Briefing","article_published_time":"2025-03-19T21:49:44+00:00","article_modified_time":"2025-03-19T21:49:48+00:00","og_image":[{"width":966,"height":425,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"C\u00e9sar Daniel Barreto","Estimeret l\u00e6setid":"5 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"wordCount":757,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","articleSection":["News"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","name":"CISA tilf\u00f8jer tre nye s\u00e5rbarheder til deres \"mest farlige\" liste: Hvad du beh\u00f8ver at vide | Sikkerhedsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","width":966,"height":425,"caption":"CISA Adds Three New Vulnerabilities to Their Most Dangerous List"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sikkerhedsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sikkerhedsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto er en anerkendt cybersikkerhedsskribent og -ekspert, der er kendt for sin dybdeg\u00e5ende viden og evne til at forenkle komplekse cybersikkerhedsemner. Med omfattende erfaring inden for netv\u00e6rkssikkerhed og databeskyttelse bidrager han regelm\u00e6ssigt med indsigtsfulde artikler og analyser om de seneste cybersikkerhedstendenser, der uddanner b\u00e5de fagfolk og offentligheden.","url":"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/3572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/comments?post=3572"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/3572\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media\/3573"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media?parent=3572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/categories?post=3572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/tags?post=3572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}