{"id":3797,"date":"2025-05-04T19:25:49","date_gmt":"2025-05-04T19:25:49","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3797"},"modified":"2025-05-04T19:25:53","modified_gmt":"2025-05-04T19:25:53","slug":"here-is-the-danish-translation-of-the-urlcisa-tilfojer-to-hojrisiko-sarbarheder-til-katalog-over-udnyttede-sarbarheder-hvad-sikkerhedsteams-bor-gore-nu","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/da\/nyheder\/here-is-the-danish-translation-of-the-urlcisa-tilfojer-to-hojrisiko-sarbarheder-til-katalog-over-udnyttede-sarbarheder-hvad-sikkerhedsteams-bor-gore-nu\/","title":{"rendered":"CISA tilf\u00f8jer to h\u00f8jrisiko-s\u00e5rbarheder til kataloget over udnyttede s\u00e5rbarheder: Hvad sikkerhedsteams b\u00f8r g\u00f8re nu"},"content":{"rendered":"<p>CISA tilf\u00f8jer to h\u00f8jrisiko-s\u00e5rbarheder til kataloget over udnyttede s\u00e5rbarheder: Hvad sikkerhedsteams b\u00f8r g\u00f8re nu <a class=\"\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">Katalog over kendte udnyttede s\u00e5rbarheder (KEV)<\/a>\u2014en kritisk informationskilde for b\u00e5de f\u00f8derale og private forsvarsteams. Den 2. maj 2025 blev to s\u00e5rbarheder tilf\u00f8jet, som er blevet bekr\u00e6ftet som udnyttet i det fri:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-34028\">CVE-2025-34028 \u2013 Commvault Command Center sti-traverseringss\u00e5rbarhed<\/a><\/li>\n\n\n\n<li><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-58136\">CVE-2024-58136 \u2013 YiiFramework alternativ sti-s\u00e5rbarhed: Uhensigtsm\u00e6ssig beskyttelse<\/a><\/li>\n<\/ul>\n\n\n\n<p>Disse udvidelser understreger behovet for, at organisationer p\u00e5 tv\u00e6rs af alle sektorer forbliver \u00e5rv\u00e5gne og proaktive i deres s\u00e5rbarhedsh\u00e5ndtering \u2013 selv n\u00e5r de ikke er underlagt aktive f\u00f8derale krav.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-these-cves-matter\"><strong>Hvorfor disse CVE\u2019er er vigtige<\/strong><\/h2>\n\n\n<p><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-34028\">CVE-2025-34028<\/a> I Commvault Command Center findes en sti-traverseringss\u00e5rbarhed, der g\u00f8r det muligt for angribere at l\u00e6se uautoriserede mapper eller k\u00f8re kode uden for de tilsigtede filstrukturer. S\u00e5rbarheden er s\u00e6rligt bekymrende p\u00e5 grund af den f\u00f8lsomme karakter af backup- og databeskyttelsessystemer, som ofte er m\u00e5l for ransomware-angreb og statssponsorerede angribere.<\/p>\n\n\n\n<p><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-58136\">CVE-2024-58136<\/a> P\u00e5virker Yii PHP Framework, som ofte anvendes i webapplikationer. Det skyldes utilstr\u00e6kkelig beskyttelse af alternative stier, hvilket kan give angribere mulighed for at omg\u00e5 adgangskontroller, der er designet til at beskytte systemet. Udnyttelse af s\u00e5rbarheden kan f\u00f8re til uautoriseret adgang til f\u00f8lsomme funktioner eller data og udg\u00f8r dermed en betydelig risiko for udviklere og platformadministratorer.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-role-of-bod-2201\"><strong>Rollen af BOD 22\u201101<\/strong><\/h2>\n\n\n<p>F\u00f8derale civile agenturer underlagt den civile gren af den ud\u00f8vende magt (Federal Civilian Executive Branch, FCEB) og omfattet af BOD 22\u201101... <a class=\"\" href=\"https:\/\/www.cisa.gov\/news-events\/directives\/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities\">Bindende operationel direktiv 22-01<\/a> skal afhj\u00e6lpe s\u00e5rbarheder, der er opf\u00f8rt i KEV-kataloget, inden for fastsatte tidsfrister. Direktivet kr\u00e6ver en struktureret og prioriteret indsats over for aktivt udnyttede CVE\u2019er for at styrke sikkerheden i offentlige netv\u00e6rk.<br>Selvom direktivet er rettet mod f\u00f8derale agenturer, anbefaler CISA kraftigt, at alle organisationer\u2014private virksomheder, leverand\u00f8rer af kritisk infrastruktur og SaaS-udbydere\u2014bruger KEV-kataloget som en hasteliste til afhj\u00e6lpning.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"expert-advice-for-security-teams\"><strong>Ekspertr\u00e5d til sikkerhedsteams<\/strong><\/h2>\n\n\n<p>Hos Security Briefing opfordrer vi til \u00f8jeblikkelig handling fra administratorer, der har ansvar for Commvault- eller Yii-installationer:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Gennemg\u00e5 alle installationer af Commvault Command Center og webapplikationer baseret p\u00e5 Yii.<\/li>\n\n\n\n<li>Opdater eller implementer afb\u00f8dningsforanstaltninger hurtigst muligt. Langvarig forsinkelse med at rette offentligt udnyttede s\u00e5rbarheder kan f\u00f8re til direkte kompromittering.<\/li>\n\n\n\n<li>Anvend filadgangskontroller og webapplikations-firewalls (WAF'er) for at identificere og forhindre fors\u00f8g p\u00e5 sti-traversering eller adgang via alternative stier.<\/li>\n\n\n\n<li>Overv\u00e5g CISA\u2019s KEV-katalog ugentligt \u2013 integrer det i automatiserede processer for s\u00e5rbarhedsscanning og afhj\u00e6lpning.<\/li>\n\n\n\n<li>Gennemg\u00e5 adgangslogfiler og udf\u00f8r trusselsjagt for tegn p\u00e5 tidligere udnyttelse, is\u00e6r i systemer med ekstern adgang.<\/li>\n<\/ul>\n\n\n\n<p><strong>Afsluttende bem\u00e6rkning:<\/strong> CISA\u2019s l\u00f8bende opdateringer af KEV-kataloget udg\u00f8r et vigtigt advarselssystem. At ignorere disse advarsler svarer til at lade kendte adgangspunkter st\u00e5 \u00e5bne for cyberkriminelle, som aktivt udnytter dem. Uanset om du tilh\u00f8rer den private eller offentlige sektor, b\u00f8r hver ny KEV-tilf\u00f8jelse behandles med h\u00f8jeste prioritet. Proaktiv s\u00e5rbarhedsh\u00e5ndtering er ikke l\u00e6ngere et valg \u2013 det er en n\u00f8dvendighed for at sikre den moderne virksomhed.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and Infrastructure Security Agency (CISA) opdaterede igen sin katalog over kendte udnyttede s\u00e5rbarheder (KEV)\u2014en kritisk informationskilde for b\u00e5de f\u00f8derale og private sektor forsvarere. Den 2. maj 2025,\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/da\/nyheder\/here-is-the-danish-translation-of-the-urlcisa-tilfojer-to-hojrisiko-sarbarheder-til-katalog-over-udnyttede-sarbarheder-hvad-sikkerhedsteams-bor-gore-nu\/\">Read more <span class=\"screen-reader-text\">CISA tilf\u00f8jer to h\u00f8jrisiko-s\u00e5rbarheder til kataloget over udnyttede s\u00e5rbarheder: Hvad sikkerhedsteams b\u00f8r g\u00f8re nu<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3798,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-3797","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/da\/nyheder\/here-is-the-danish-translation-of-the-urlcisa-tilfojer-to-hojrisiko-sarbarheder-til-katalog-over-udnyttede-sarbarheder-hvad-sikkerhedsteams-bor-gore-nu\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) again refreshed its Known Exploited Vulnerabilities Catalog (KEV)\u2014a critical source of information for both federal and private sector defenders. On May 2, 2025,&hellip; L\u00e6s mere CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/da\/nyheder\/here-is-the-danish-translation-of-the-urlcisa-tilfojer-to-hojrisiko-sarbarheder-til-katalog-over-udnyttede-sarbarheder-hvad-sikkerhedsteams-bor-gore-nu\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-04T19:25:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-04T19:25:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"966\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now\",\"datePublished\":\"2025-05-04T19:25:49+00:00\",\"dateModified\":\"2025-05-04T19:25:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\"},\"wordCount\":464,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\",\"name\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"datePublished\":\"2025-05-04T19:25:49+00:00\",\"dateModified\":\"2025-05-04T19:25:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"width\":966,\"height\":425,\"caption\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA Tilf\u00f8jer To H\u00f8jrisiko S\u00e5rbarheder til Udnyttet Katalog: Hvad Sikkerhedsteams B\u00f8r G\u00f8re Nu | Sikkerhedsbriefing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/da\/nyheder\/here-is-the-danish-translation-of-the-urlcisa-tilfojer-to-hojrisiko-sarbarheder-til-katalog-over-udnyttede-sarbarheder-hvad-sikkerhedsteams-bor-gore-nu\/","og_locale":"da_DK","og_type":"article","og_title":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) again refreshed its Known Exploited Vulnerabilities Catalog (KEV)\u2014a critical source of information for both federal and private sector defenders. On May 2, 2025,&hellip; L\u00e6s mere CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now","og_url":"https:\/\/securitybriefing.net\/da\/nyheder\/here-is-the-danish-translation-of-the-urlcisa-tilfojer-to-hojrisiko-sarbarheder-til-katalog-over-udnyttede-sarbarheder-hvad-sikkerhedsteams-bor-gore-nu\/","og_site_name":"Security Briefing","article_published_time":"2025-05-04T19:25:49+00:00","article_modified_time":"2025-05-04T19:25:53+00:00","og_image":[{"width":966,"height":425,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"C\u00e9sar Daniel Barreto","Estimeret l\u00e6setid":"3 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now","datePublished":"2025-05-04T19:25:49+00:00","dateModified":"2025-05-04T19:25:53+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/"},"wordCount":464,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","articleSection":["News"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/","url":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/","name":"CISA Tilf\u00f8jer To H\u00f8jrisiko S\u00e5rbarheder til Udnyttet Katalog: Hvad Sikkerhedsteams B\u00f8r G\u00f8re Nu | Sikkerhedsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","datePublished":"2025-05-04T19:25:49+00:00","dateModified":"2025-05-04T19:25:53+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","width":966,"height":425,"caption":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sikkerhedsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sikkerhedsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto er en anerkendt cybersikkerhedsskribent og -ekspert, der er kendt for sin dybdeg\u00e5ende viden og evne til at forenkle komplekse cybersikkerhedsemner. Med omfattende erfaring inden for netv\u00e6rkssikkerhed og databeskyttelse bidrager han regelm\u00e6ssigt med indsigtsfulde artikler og analyser om de seneste cybersikkerhedstendenser, der uddanner b\u00e5de fagfolk og offentligheden.","url":"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/3797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/comments?post=3797"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/3797\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media\/3798"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media?parent=3797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/categories?post=3797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/tags?post=3797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}