{"id":3572,"date":"2025-03-19T21:49:44","date_gmt":"2025-03-19T21:49:44","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3572"},"modified":"2025-03-19T21:49:48","modified_gmt":"2025-03-19T21:49:48","slug":"a-cisa-harom-uj-sebezhetoseget-ad-hozza-a-legveszelyesebb-listajahoz-amit-tudnia-kell","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-harom-uj-sebezhetoseget-ad-hozza-a-legveszelyesebb-listajahoz-amit-tudnia-kell\/","title":{"rendered":"A CISA h\u00e1rom \u00faj sebezhet\u0151s\u00e9get adott hozz\u00e1 a \u201clegvesz\u00e9lyesebb\u201d list\u00e1jukhoz: Amit tudnia kell"},"content":{"rendered":"<p>A Kiberbiztons\u00e1gi \u00e9s Infrastrukt\u00fara Biztons\u00e1gi \u00dcgyn\u00f6ks\u00e9g (CISA) \u00e9ppen most jelentette be a leg\u00fajabb Ismert Kihaszn\u00e1lt S\u00e9r\u00fcl\u00e9kenys\u00e9gek (KEV) Katal\u00f3gus\u00e1t h\u00e1rom \u00faj biztons\u00e1gi gyenges\u00e9ggel, amelyeket a hackerek jelenleg kihaszn\u00e1lnak, hogy rendszerekbe hatoljanak be. Ennek az \u00e9rtes\u00edt\u00e9snek a jelent\u0151s\u00e9ge azon alapul, hogy a CISA figyelmeztet\u00e9sei nem valamilyen elm\u00e9leti helyzetet jeleznek \u2013 ezek a s\u00e9r\u00fcl\u00e9kenys\u00e9gek hat\u00e1rozottak abban az \u00e9rtelemben, hogy val\u00f3di t\u00e1mad\u00e1sok sor\u00e1n t\u00e9nylegesen kompromitt\u00e1l\u00f3dnak.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-was-added\"><strong>Mi ker\u00fclt hozz\u00e1ad\u00e1sra?<\/strong><\/h2>\n\n\n<p>Ford\u00edtsuk le ezt a h\u00e1rom s\u00e9r\u00fcl\u00e9kenys\u00e9get h\u00e9tk\u00f6znapi nyelvre:<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"1-edimax-ip-camera-vulnerability-cve20251316\"><strong>1. Edimax IP kamera s\u00e9r\u00fcl\u00e9kenys\u00e9g (CVE-2025-1316)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg\" alt=\"Edimax IP kamera s\u00e9r\u00fcl\u00e9kenys\u00e9g\" class=\"wp-image-3574\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Az eml\u00edtett biztons\u00e1gi probl\u00e9ma <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1316\">az Edimax IC-7100 biztons\u00e1gi kamer\u00e1kban<\/a> az \u00fagynevezett \u201cparancs befecskendez\u00e9sre\u201d utal. Az \u00f6tlet az, hogy a t\u00e1mad\u00f3k r\u00e1vehetik a kamer\u00e1t, hogy k\u00e1ros k\u00f3dot hajtson v\u00e9gre. Ezekkel a kamer\u00e1kkal otthon vagy irod\u00e1ban telep\u00edtve c\u00e9lpontt\u00e1 v\u00e1lhatnak nem enged\u00e9lyezett felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra, akik hozz\u00e1f\u00e9rhetnek a kamera k\u00e9peihez, megv\u00e1ltoztathatj\u00e1k a be\u00e1ll\u00edt\u00e1sokat, vagy ezeket a kamer\u00e1kat m\u00e1s h\u00e1l\u00f3zati eszk\u00f6z\u00f6k megt\u00e1mad\u00e1s\u00e1ra haszn\u00e1lhatj\u00e1k.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"2-nakivo-backup-software-vulnerability-cve202448248\"><strong>2. NAKIVO biztons\u00e1gi ment\u00e9si szoftver s\u00e9r\u00fcl\u00e9kenys\u00e9g (CVE-2024-48248)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg\" alt=\"NAKIVO biztons\u00e1gi ment\u00e9si szoftver s\u00e9r\u00fcl\u00e9kenys\u00e9g\" class=\"wp-image-3575\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.nakivo.com\/\">A NAKIVO<\/a> biztons\u00e1gi ment\u00e9si \u00e9s helyre\u00e1ll\u00edt\u00e1si megold\u00e1sokat fejleszt, amelyeket sok v\u00e1llalkoz\u00e1s haszn\u00e1l az adatv\u00e9delem biztos\u00edt\u00e1s\u00e1ra. A sz\u00f3ban forg\u00f3 hiba neve \u201c<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/36.html\">abszol\u00fat \u00fatvonal bej\u00e1r\u00e1s<\/a>,\u201d, amely lehet\u0151v\u00e9 teszi a t\u00e1mad\u00f3k sz\u00e1m\u00e1ra, hogy hozz\u00e1f\u00e9rjenek olyan f\u00e1jlokhoz, amelyeket nem lenne szabad l\u00e1tniuk. Ez k\u00fcl\u00f6n\u00f6sen kock\u00e1zatos a biztons\u00e1gi ment\u00e9si szoftverek eset\u00e9ben, ahol a ment\u00e9sek gyakran \u00e9rz\u00e9keny adatokat tartalmaznak. Azok a betolakod\u00f3k, akik kihaszn\u00e1lj\u00e1k ezt a s\u00e9r\u00fcl\u00e9kenys\u00e9get, hozz\u00e1f\u00e9rhetnek, ellophatj\u00e1k vagy t\u00f6r\u00f6lhetik a mentett adatokat.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"3-sap-netweaver-vulnerability-cve201712637\"><strong>3. SAP NetWeaver s\u00e9r\u00fcl\u00e9kenys\u00e9g (CVE-2017-12637)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg\" alt=\"SAP NetWeaver s\u00e9r\u00fcl\u00e9kenys\u00e9g\" class=\"wp-image-3576\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Ez k\u00fcl\u00f6n\u00f6sen kritikus, mivel 2017-b\u0151l sz\u00e1rmazik, ami meglehet\u0151sen r\u00e9gen volt \u2013 ez majdnem nyolc \u00e9v. Az SAP NetWeaver az egyik technol\u00f3giai platform, amely k\u00fcl\u00f6nf\u00e9le kritikus \u00fczleti alkalmaz\u00e1sokat hajt v\u00e9gre. Ez a r\u00e9s pontosan az a fajta dolog, amely \u201c<a href=\"https:\/\/portswigger.net\/web-security\/file-path-traversal\">k\u00f6nyvt\u00e1r bej\u00e1r\u00e1st<\/a>\u201d tesz lehet\u0151v\u00e9, ahol emiatt a betolakod\u00f3k hozz\u00e1f\u00e9rhetnek tiltott f\u00e1jlokhoz \u00e9s k\u00f6nyvt\u00e1rakhoz. Az a t\u00e9ny, hogy sok rendszer m\u00e9g ennyi \u00e9v ut\u00e1n is \u00e9rintetlen a jav\u00edt\u00e1s \u00e1ltal, az oka annak, hogy a t\u00e1mad\u00f3k most kihaszn\u00e1lj\u00e1k.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-this-matters-to-everyone\"><strong>Mi\u00e9rt fontos ez mindenki sz\u00e1m\u00e1ra<\/strong><\/h2>\n\n\n<p>B\u00e1r a CISA ir\u00e1nyelvei csak a sz\u00f6vets\u00e9gi korm\u00e1nyzati hat\u00f3s\u00e1gok sz\u00e1m\u00e1ra k\u00f6telez\u0151ek, KEV Katal\u00f3gusukat a legfrissebb forr\u00e1sk\u00e9nt \u00e1ll\u00edtott\u00e1k be a legfontosabb hib\u00e1k kijav\u00edt\u00e1s\u00e1ra. Ha egy hiba beker\u00fcl ebbe a list\u00e1ba, az a k\u00f6vetkez\u0151ket jelenti:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A hackerek ezeket a s\u00e9r\u00fcl\u00e9kenys\u00e9geket haszn\u00e1lj\u00e1k<\/li>\n\n\n\n<li>A t\u00e1mad\u00e1sok annyira sikeresek, hogy m\u00e1r nemzeti szintre jutottak<\/li>\n\n\n\n<li>Ezekb\u0151l a s\u00e9r\u00fcl\u00e9kenys\u00e9gekb\u0151l sz\u00e1rmaz\u00f3 potenci\u00e1lis k\u00e1r jelent\u0151s<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-should-you-do\"><strong>Mit kell tennie?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"for-home-users\"><strong>Otthoni felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Ha Edimax kamer\u00e1i vannak, ellen\u0151rizze a gy\u00e1rt\u00f3 weboldal\u00e1t, hogy kiadtak-e firmware friss\u00edt\u00e9seket<\/li>\n\n\n\n<li>Gy\u0151z\u0151dj\u00f6n meg r\u00f3la, hogy eszk\u00f6zei rendelkeznek az \u00f6sszes sz\u00fcks\u00e9ges biztons\u00e1gi jav\u00edt\u00e1ssal<\/li>\n\n\n\n<li>Gondolja \u00e1t azokat a vadonat\u00faj r\u00e9gi eszk\u00f6z\u00f6ket, amelyek val\u00f3sz\u00edn\u0171leg m\u00e1r nem kapnak biztons\u00e1gi jav\u00edt\u00e1sokat<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-business-users\"><strong>\u00dczleti felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Vegye fel a lelt\u00e1rba, hogy melyek azok az \u00e9rintett term\u00e9kek (Edimax kamer\u00e1k, NAKIVO biztons\u00e1gi ment\u00e9si szoftver vagy SAP NetWeaver), amelyeket a szervezete haszn\u00e1l<\/li>\n\n\n\n<li>Tegye ezeknek a rendszereknek a jav\u00edt\u00e1s\u00e1t a teend\u0151i list\u00e1j\u00e1nak \u00e9l\u00e9re<\/li>\n\n\n\n<li>Ha nem tudja azonnal telep\u00edteni a jav\u00edt\u00e1st, pr\u00f3b\u00e1lja meg minimaliz\u00e1lni a potenci\u00e1lis k\u00e1rt az\u00e1ltal, hogy a h\u00e1l\u00f3zat t\u00f6bbi r\u00e9sz\u00e9t h\u00e1l\u00f3zati szegment\u00e1l\u00e1ssal izol\u00e1lja<\/li>\n\n\n\n<li>N\u00e9zze \u00e1t a biztons\u00e1gi ment\u00e9si rutinjait, hogy biztos\u00edtsa, hogy fert\u0151z\u00e9smentes p\u00e9ld\u00e1nyok \u00e1lljanak rendelkez\u00e9sre a helyre\u00e1ll\u00edt\u00e1shoz egy esetleges megs\u00e9rt\u00e9s eset\u00e9n<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-it-professionals\"><strong>IT szakemberek sz\u00e1m\u00e1ra:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Haszn\u00e1lja ki a <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">CISA KEV Katal\u00f3gus\u00e1t<\/a>, amely gyakorlatilag egy pontoz\u00f3t\u00e1bla a s\u00e9r\u00fcl\u00e9kenys\u00e9gkezel\u00e9si programj\u00e1hoz<\/li>\n\n\n\n<li>Ne feledkezzen meg a r\u00e9gi rendszerekr\u0151l, amelyek esetleg az SAP NetWeaver platform elavult verzi\u00f3it futtatj\u00e1k a friss\u00edt\u00e9s sor\u00e1n<\/li>\n\n\n\n<li>Tal\u00e1n \u00e9rdemes lenne gyakrabban v\u00e9gezni s\u00e9r\u00fcl\u00e9kenys\u00e9gvizsg\u00e1latot a nagyon fontos rendszerek eset\u00e9ben<\/li>\n\n\n\n<li>Ebben az esetben dolgozzon ki egy vill\u00e1mgyors tervet arr\u00f3l, hogyan kezelje a legkritikusabb helyzeteket, am\u00edg m\u00e9g a jelen pillanatban vannak<\/li>\n<\/ul>\n\n\n\n<p>A 8 \u00e9vvel ezel\u0151tti s\u00e9r\u00fcl\u00e9kenys\u00e9g p\u00e9ld\u00e1ja nagyszer\u0171 lecke annak meg\u00e9rt\u00e9s\u00e9re, hogy a folyamat <a href=\"https:\/\/securitybriefing.net\/hu\/.\/kiberbiztonsag\/\">kiberbiztons\u00e1g <\/a>soha nem \u00e9r v\u00e9get. Sok v\u00e1llalat m\u00e9g mindig r\u00e9gebbi szoftvereket haszn\u00e1l, amelyek esetleg j\u00f3l ismert s\u00e9r\u00fcl\u00e9kenys\u00e9gekkel rendelkeznek, \u00e9s ez ahhoz a k\u00f6r\u00fclm\u00e9nyhez vezet, hogy a t\u00e1mad\u00f3knak probl\u00e9m\u00e1juk van az \u00fatjukban. Ez\u00e9rt sz\u00fcks\u00e9ges a szoftverek \u00e9s rendszerek rendszeres friss\u00edt\u00e9se, valamint a m\u0171k\u00f6d\u0151 g\u00e9pekhez v\u00e9gzett jav\u00edt\u00e1sok \u00e9s biztons\u00e1gi \u00e9rt\u00e9kel\u00e9sek.<\/p>\n\n\n\n<p>Ne feledje, hogy amikor a CISA friss\u00edti KEV Katal\u00f3gus\u00e1t, az nem csak egy \u00fajabb gyenges\u00e9g \u2013 val\u00f3j\u00e1ban egy biztons\u00e1gi r\u00e9s, amelyet a t\u00e1mad\u00f3k sz\u00e9les k\u00f6rben haszn\u00e1lnak jelenleg az adatok megfert\u0151z\u00e9s\u00e9re \u00e9s ellop\u00e1s\u00e1ra. Legyen gyors, \u00e9s legyen r\u00e9sze egy \u00faj adminisztr\u00e1ci\u00f3nak, amely nem fog szemben\u00e9zni a rosszindulat\u00fa programok \u00e1ltali megs\u00e9rt\u00e9s okozta neh\u00e9zs\u00e9gekkel.<\/p>","protected":false},"excerpt":{"rendered":"<p>The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-harom-uj-sebezhetoseget-ad-hozza-a-legveszelyesebb-listajahoz-amit-tudnia-kell\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A CISA h\u00e1rom \u00faj sebezhet\u0151s\u00e9get adott hozz\u00e1 a \u201clegvesz\u00e9lyesebb\u201d list\u00e1jukhoz: Amit tudnia kell<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3573,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-3572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-harom-uj-sebezhetoseget-ad-hozza-a-legveszelyesebb-listajahoz-amit-tudnia-kell\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Continue reading CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-harom-uj-sebezhetoseget-ad-hozza-a-legveszelyesebb-listajahoz-amit-tudnia-kell\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T21:49:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T21:49:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"966\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"wordCount\":757,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"name\":\"CISA Adds Three New Vulnerabilities to Their \\\"Most Dangerous\\\" List: What You Need to Know | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"width\":966,\"height\":425,\"caption\":\"CISA Adds Three New Vulnerabilities to Their Most Dangerous List\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A CISA h\u00e1rom \u00faj sebezhet\u0151s\u00e9get adott hozz\u00e1 a \"Legvesz\u00e9lyesebb\" list\u00e1j\u00e1hoz: Amit tudnia kell | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-harom-uj-sebezhetoseget-ad-hozza-a-legveszelyesebb-listajahoz-amit-tudnia-kell\/","og_locale":"hu_HU","og_type":"article","og_title":"CISA Adds Three New Vulnerabilities to Their \"Most Dangerous\" List: What You Need to Know | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Continue reading CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","og_url":"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-harom-uj-sebezhetoseget-ad-hozza-a-legveszelyesebb-listajahoz-amit-tudnia-kell\/","og_site_name":"Security Briefing","article_published_time":"2025-03-19T21:49:44+00:00","article_modified_time":"2025-03-19T21:49:48+00:00","og_image":[{"width":966,"height":425,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"5 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"wordCount":757,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","articleSection":["News"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","name":"A CISA h\u00e1rom \u00faj sebezhet\u0151s\u00e9get adott hozz\u00e1 a \"Legvesz\u00e9lyesebb\" list\u00e1j\u00e1hoz: Amit tudnia kell | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","width":966,"height":425,"caption":"CISA Adds Three New Vulnerabilities to Their Most Dangerous List"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/3572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=3572"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/3572\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/3573"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=3572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=3572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=3572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}