{"id":3572,"date":"2025-03-19T21:49:44","date_gmt":"2025-03-19T21:49:44","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3572"},"modified":"2025-03-19T21:49:48","modified_gmt":"2025-03-19T21:49:48","slug":"cisa-nimmt-drei-neue-sicherheitslucken-in-die-liste-der-gefahrlichsten-sicherheitslucken-auf-was-sie-wissen-mussen","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/de\/nachrichten\/cisa-nimmt-drei-neue-sicherheitslucken-in-die-liste-der-gefahrlichsten-sicherheitslucken-auf-was-sie-wissen-mussen\/","title":{"rendered":"CISA nimmt drei neue Sicherheitsl\u00fccken in die Liste der gef\u00e4hrlichsten\" Sicherheitsl\u00fccken auf: Was Sie wissen m\u00fcssen"},"content":{"rendered":"<p>Die Agentur f\u00fcr Cybersicherheit und Infrastruktursicherheit (CISA) hat soeben den neuesten KEV-Katalog (Known Exploited Vulnerabilities) mit drei neuen Sicherheitsschwachstellen ver\u00f6ffentlicht, die Hacker derzeit ausnutzen, um in Systeme einzudringen. Die Bedeutung dieser Bekanntmachung liegt in der Tatsache begr\u00fcndet, dass die CISA-Warnungen nicht auf eine theoretische Situation hinweisen - diese Schwachstellen sind definitiv in dem Sinne, dass sie tats\u00e4chlich f\u00fcr reale Angriffe ausgenutzt werden.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-was-added\"><strong>Was wurde hinzugef\u00fcgt?<\/strong><\/h2>\n\n\n<p>Lassen Sie uns diese drei Schwachstellen in die Alltagssprache \u00fcbersetzen:<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"1-edimax-ip-camera-vulnerability-cve20251316\"><strong>1. Sicherheitsl\u00fccke bei Edimax IP-Kameras (CVE-2025-1316)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg\" alt=\"Edimax IP-Kamera Sicherheitsl\u00fccke\" class=\"wp-image-3574\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Das erw\u00e4hnte Sicherheitsproblem in <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1316\">die Edimax IC-7100 Sicherheitskameras<\/a> bezieht sich auf die so genannte \"Befehlsinjektion\". Die Idee dahinter ist, dass Angreifer die Kamera dazu bringen k\u00f6nnen, sch\u00e4dlichen Code auszuf\u00fchren. Wenn diese Kameras zu Hause oder im B\u00fcro installiert sind, k\u00f6nnten sie von nicht autorisierten Benutzern ins Visier genommen werden, die sich Zugriff auf Ihre Kamera-Feeds verschaffen, Einstellungen \u00e4ndern oder diese Kameras f\u00fcr Angriffe auf andere Ger\u00e4te in Ihrem Netzwerk verwenden k\u00f6nnten.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"2-nakivo-backup-software-vulnerability-cve202448248\"><strong>2. Sicherheitsl\u00fccke in der NAKIVO Backup-Software (CVE-2024-48248)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg\" alt=\"Sicherheitsl\u00fccke in der NAKIVO Backup Software\" class=\"wp-image-3575\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.nakivo.com\/\">NAKIVO<\/a> entwickelt Sicherungs- und Wiederherstellungsl\u00f6sungen, die von vielen Unternehmen zum Schutz ihrer Daten eingesetzt werden. Die betreffende Schwachstelle wird als \"<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/36.html\">absolute Pfadverfolgung<\/a>Dadurch k\u00f6nnen sich Angreifer Zugang zu Dateien verschaffen, die sie nicht sehen sollen. Dies ist besonders riskant bei Sicherungssoftware, da die Sicherungen oft sensible Daten enthalten. Angreifer, die diese Sicherheitsl\u00fccke ausnutzen, k\u00f6nnen m\u00f6glicherweise auf die gesicherten Daten zugreifen, sie stehlen oder l\u00f6schen.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"3-sap-netweaver-vulnerability-cve201712637\"><strong>3. SAP NetWeaver Sicherheitsl\u00fccke (CVE-2017-12637)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg\" alt=\"SAP NetWeaver Sicherheitsl\u00fccke\" class=\"wp-image-3576\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Dies ist besonders kritisch, da es aus dem Jahr 2017 stammt, was eine ziemlich lange Zeit zur\u00fcckliegt - also fast acht Jahre. SAP NetWeaver ist eine der Technologieplattformen, die verschiedene wichtige Gesch\u00e4ftsanwendungen ausf\u00fchren. Diese L\u00fccke ist genau die Art von Sache, die eine \"<a href=\"https:\/\/portswigger.net\/web-security\/file-path-traversal\">Verzeichnisdurchquerung<\/a>\", durch die Eindringlinge Zugriff auf unzul\u00e4ssige Dateien und Verzeichnisse erlangen konnten. Die Tatsache, dass viele Systeme auch nach so vielen Jahren noch nicht von dem Patch betroffen sind, ist der Grund, warum Angreifer ihn jetzt ausnutzen.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-this-matters-to-everyone\"><strong>Warum dies f\u00fcr alle wichtig ist<\/strong><\/h2>\n\n\n<p>Obwohl die Richtlinien der CISA nur f\u00fcr Bundesbeh\u00f6rden verbindlich sind, gilt ihr KEV-Katalog als die aktuellste Quelle f\u00fcr die Auswahl der wichtigsten zu behebenden Fehler. Sobald ein Fehler in dieser Liste enthalten ist, bedeutet dies Folgendes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hacker nutzen diese Schwachstellen<\/li>\n\n\n\n<li>Die Angriffe sind so erfolgreich, dass sie bereits die nationale Ebene erreicht haben<\/li>\n\n\n\n<li>Der potenzielle Schaden durch diese Schwachstellen ist erheblich<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-should-you-do\"><strong>Was sollten Sie tun?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"for-home-users\"><strong>F\u00fcr Heimanwender:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Wenn Sie Edimax-Kameras besitzen, \u00fcberpr\u00fcfen Sie auf der Website des Herstellers, ob Firmware-Updates ver\u00f6ffentlicht wurden.<\/li>\n\n\n\n<li>Vergewissern Sie sich, dass Ihre Ger\u00e4te mit allen erforderlichen Sicherheits-Patches ausgestattet sind.<\/li>\n\n\n\n<li>Denken Sie an die brandneuen alten Ger\u00e4te, die wahrscheinlich nicht mehr die Sicherheits-Patches erhalten<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-business-users\"><strong>F\u00fcr Gesch\u00e4ftskunden:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Geben Sie in Ihrem Inventar an, welche Produkte (Edimax-Kameras, NAKIVO-Backup-Software oder SAP NetWeaver) in Ihrem Unternehmen verwendet werden.<\/li>\n\n\n\n<li>Setzen Sie das Patchen dieser Systeme ganz oben auf Ihre To-Do-Liste<\/li>\n\n\n\n<li>Wenn Sie den Patch nicht sofort installieren k\u00f6nnen, sollten Sie versuchen, den potenziellen Schaden zu minimieren, indem Sie den Rest des Netzwerks durch Netzwerksegmentierung isolieren<\/li>\n\n\n\n<li>Gehen Sie Ihre Backup-Routinen durch, um sicherzustellen, dass Sie nicht infizierte Kopien haben, die Sie im Falle eines Versto\u00dfes wiederherstellen k\u00f6nnen.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-it-professionals\"><strong>F\u00fcr IT-Fachleute:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Nutzen Sie die <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">KEV-Katalog von CISA<\/a>die praktisch eine Scorecard f\u00fcr Ihr Schwachstellenmanagementprogramm ist<\/li>\n\n\n\n<li>Vergessen Sie bei der Aktualisierung nicht alte Systeme, auf denen m\u00f6glicherweise veraltete Versionen der SAP NetWeaver-Plattform laufen.<\/li>\n\n\n\n<li>Vielleicht sollten Sie dazu \u00fcbergehen, die sehr wichtigen Systeme h\u00e4ufiger auf Sicherheitsl\u00fccken zu \u00fcberpr\u00fcfen<\/li>\n\n\n\n<li>In diesem Fall sollten Sie sich in Windeseile einen Plan zurechtlegen, wie Sie mit den kritischsten Situationen umgehen k\u00f6nnen, solange sie sich noch in der Gegenwart befinden<\/li>\n<\/ul>\n\n\n\n<p>Das Beispiel einer Schwachstelle von vor 8 Jahren ist eine gute Lektion, um zu verstehen, dass der Prozess der <a href=\"https:\/\/securitybriefing.net\/de\/middle-relays-ubermitteln-daten-halten-deren-geschwindigkeit-und-verschlusseln-sie-sie-sind-leicht-zu-finden-und-relativ-sicher-zu-verbinden-da-ihr-standort-verborgen-ist\/cybersicherheit\/\">Cybersicherheit <\/a>ist unaufh\u00f6rlich. Es gibt viele Unternehmen, die noch \u00e4ltere Software verwenden, die bekannte Schwachstellen haben k\u00f6nnte, und das f\u00fchrt dazu, dass Angreifer ein Problem haben. Dies erfordert regelm\u00e4\u00dfige Aktualisierungen der Software und der Systeme sowie Patches und Sicherheitsbewertungen, die f\u00fcr die funktionierenden Maschinen durchgef\u00fchrt werden k\u00f6nnen.<\/p>\n\n\n\n<p>Denken Sie daran, dass es sich bei der Aktualisierung des KEV-Katalogs durch die KAG nicht nur um eine weitere Schwachstelle handelt, sondern um eine Sicherheitsl\u00fccke, die Angreifer derzeit h\u00e4ufig nutzen, um Daten zu infizieren und zu stehlen. Seien Sie schnell und geh\u00f6ren Sie zu einer neuen Verwaltung, die nicht durch eine Malware-Verletzung in Schwierigkeiten geraten wird.<\/p>","protected":false},"excerpt":{"rendered":"<p>Die Agentur f\u00fcr Cybersicherheit und Infrastruktursicherheit (CISA) hat soeben den neuesten KEV-Katalog (Known Exploited Vulnerabilities) mit drei neuen Sicherheitsl\u00fccken ver\u00f6ffentlicht, die Hacker derzeit ausnutzen, um sich in Systeme einzuhacken.... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/de\/nachrichten\/cisa-nimmt-drei-neue-sicherheitslucken-in-die-liste-der-gefahrlichsten-sicherheitslucken-auf-was-sie-wissen-mussen\/\"><span class=\"screen-reader-text\">CISA nimmt drei neue Sicherheitsl\u00fccken in die Liste der gef\u00e4hrlichsten\" Sicherheitsl\u00fccken auf: Was Sie wissen m\u00fcssen<\/span> read more<\/a><\/p>","protected":false},"author":3,"featured_media":3573,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-3572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/de\/nachrichten\/cisa-nimmt-drei-neue-sicherheitslucken-in-die-liste-der-gefahrlichsten-sicherheitslucken-auf-was-sie-wissen-mussen\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know weiterlesen\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/de\/nachrichten\/cisa-nimmt-drei-neue-sicherheitslucken-in-die-liste-der-gefahrlichsten-sicherheitslucken-auf-was-sie-wissen-mussen\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T21:49:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T21:49:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"966\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschrieben von\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"wordCount\":757,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"name\":\"CISA Adds Three New Vulnerabilities to Their \\\"Most Dangerous\\\" List: What You Need to Know | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"width\":966,\"height\":425,\"caption\":\"CISA Adds Three New Vulnerabilities to Their Most Dangerous List\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/de\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA f\u00fcgt ihrer Liste der \"Gef\u00e4hrlichsten\" drei neue Schwachstellen hinzu: Was Sie wissen m\u00fcssen | Sicherheitsbriefing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/de\/nachrichten\/cisa-nimmt-drei-neue-sicherheitslucken-in-die-liste-der-gefahrlichsten-sicherheitslucken-auf-was-sie-wissen-mussen\/","og_locale":"de_DE","og_type":"article","og_title":"CISA Adds Three New Vulnerabilities to Their \"Most Dangerous\" List: What You Need to Know | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know weiterlesen","og_url":"https:\/\/securitybriefing.net\/de\/nachrichten\/cisa-nimmt-drei-neue-sicherheitslucken-in-die-liste-der-gefahrlichsten-sicherheitslucken-auf-was-sie-wissen-mussen\/","og_site_name":"Security Briefing","article_published_time":"2025-03-19T21:49:44+00:00","article_modified_time":"2025-03-19T21:49:48+00:00","og_image":[{"width":966,"height":425,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Geschrieben von":"C\u00e9sar Daniel Barreto","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"wordCount":757,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","articleSection":["News"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","name":"CISA f\u00fcgt ihrer Liste der \"Gef\u00e4hrlichsten\" drei neue Schwachstellen hinzu: Was Sie wissen m\u00fcssen | Sicherheitsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","width":966,"height":425,"caption":"CISA Adds Three New Vulnerabilities to Their Most Dangerous List"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sicherheitsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sicherheitsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto ist ein gesch\u00e4tzter Cybersecurity-Autor und -Experte, der f\u00fcr sein fundiertes Wissen und seine F\u00e4higkeit bekannt ist, komplexe Cybersicherheitsthemen zu vereinfachen. Mit seiner umfassenden Erfahrung in den Bereichen Netzwerksicherheit und Datenschutz verfasst er regelm\u00e4\u00dfig aufschlussreiche Artikel und Analysen zu den neuesten Trends in der Cybersicherheit und informiert damit sowohl Fachleute als auch die \u00d6ffentlichkeit.","url":"https:\/\/securitybriefing.net\/de\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts\/3572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/comments?post=3572"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts\/3572\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/media\/3573"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/media?parent=3572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/categories?post=3572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/tags?post=3572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}