{"id":3797,"date":"2025-05-04T19:25:49","date_gmt":"2025-05-04T19:25:49","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3797"},"modified":"2025-05-04T19:25:53","modified_gmt":"2025-05-04T19:25:53","slug":"a-cisa-ket-magas-kockazatu-sebezhetoseget-ad-hozza-a-kihasznalt-katalogushoz-mit-kell-most-tenniuk-a-biztonsagi-csapatoknak","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-ket-magas-kockazatu-sebezhetoseget-ad-hozza-a-kihasznalt-katalogushoz-mit-kell-most-tenniuk-a-biztonsagi-csapatoknak\/","title":{"rendered":"A CISA k\u00e9t magas kock\u00e1zat\u00fa sebezhet\u0151s\u00e9get adott hozz\u00e1 a kihaszn\u00e1lt katal\u00f3gushoz: Mit kell most tenni\u00fck a biztons\u00e1gi csapatoknak"},"content":{"rendered":"<p>A Kiberbiztons\u00e1gi \u00e9s Infrastrukt\u00fara Biztons\u00e1gi \u00dcgyn\u00f6ks\u00e9g (CISA) ism\u00e9t friss\u00edtette <a class=\"\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">a J\u00f3l Ismert Kihaszn\u00e1lt S\u00e9r\u00fcl\u00e9kenys\u00e9gek Katal\u00f3gus\u00e1t (KEV)<\/a>\u2014egy kritikus inform\u00e1ci\u00f3forr\u00e1s mind a sz\u00f6vets\u00e9gi, mind a mag\u00e1nszektor v\u00e9delmez\u0151i sz\u00e1m\u00e1ra. 2025. m\u00e1jus 2-\u00e1n k\u00e9t s\u00e9r\u00fcl\u00e9kenys\u00e9get adtak hozz\u00e1, amelyeket igazoltan kihaszn\u00e1ltak a vadonban:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-34028\">CVE-2025-34028 \u2013 Commvault Command Center \u00datvonal Bej\u00e1r\u00e1si S\u00e9r\u00fcl\u00e9kenys\u00e9g<\/a><\/li>\n\n\n\n<li><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-58136\">CVE-2024-58136 \u2013 YiiFramework Alternat\u00edv \u00datvonal S\u00e9r\u00fcl\u00e9kenys\u00e9g: Nem Megfelel\u0151 V\u00e9delem<\/a><\/li>\n<\/ul>\n\n\n\n<p>Ezek a b\u0151v\u00edt\u00e9sek kiemelik annak sz\u00fcks\u00e9gess\u00e9g\u00e9t, hogy a szervezetek minden szektorban \u00e9berek \u00e9s proakt\u00edvak maradjanak a s\u00e9r\u00fcl\u00e9kenys\u00e9gkezel\u00e9s ter\u00e9n, m\u00e9g akkor is, ha nem \u00e1llnak akt\u00edv sz\u00f6vets\u00e9gi k\u00f6vetelm\u00e9nyek alatt.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-these-cves-matter\"><strong>Mi\u00e9rt Fontosak Ezek a CVE-k<\/strong><\/h2>\n\n\n<p><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-34028\">CVE-2025-34028<\/a> a Commvault Command Centerben egy \u00fatvonal bej\u00e1r\u00e1si s\u00e9r\u00fcl\u00e9kenys\u00e9g, amely lehet\u0151v\u00e9 teszi a t\u00e1mad\u00f3k sz\u00e1m\u00e1ra, hogy jogosulatlan k\u00f6nyvt\u00e1rakat olvassanak vagy k\u00f3dot futtassanak a sz\u00e1nd\u00e9kolt f\u00e1jlszerkezeteken k\u00edv\u00fcl. A s\u00e9r\u00fcl\u00e9kenys\u00e9g k\u00fcl\u00f6n\u00f6sen aggaszt\u00f3 a biztons\u00e1gi ment\u00e9si \u00e9s adatv\u00e9delmi rendszerek \u00e9rz\u00e9keny term\u00e9szete miatt, amelyek a zsarol\u00f3v\u00edrus-t\u00e1mad\u00f3k \u00e9s az \u00e1llami t\u00e1mad\u00f3k kedvenc c\u00e9lpontjai.<\/p>\n\n\n\n<p><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-58136\">CVE-2024-58136<\/a> a Yii PHP Keretrendszert \u00e9rinti, amelyet gyakran haszn\u00e1lnak webalkalmaz\u00e1sokban. Ez az alternat\u00edv \u00fatvonalak nem megfelel\u0151 v\u00e9delm\u00e9nek eredm\u00e9nye, ami lehet\u0151v\u00e9 teheti a t\u00e1mad\u00f3k sz\u00e1m\u00e1ra, hogy megker\u00fclj\u00e9k az erre tervezett hozz\u00e1f\u00e9r\u00e9s-ellen\u0151rz\u00e9seket. Kihaszn\u00e1l\u00e1sa \u00e9rz\u00e9keny funkci\u00f3k vagy adatok jogosulatlan haszn\u00e1lat\u00e1hoz vezethet, \u00edgy jelent\u0151s kock\u00e1zatot jelent a fejleszt\u0151k \u00e9s platform adminisztr\u00e1torok sz\u00e1m\u00e1ra.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-role-of-bod-2201\"><strong>A BOD 22-01 Szerepe<\/strong><\/h2>\n\n\n<p>A Sz\u00f6vets\u00e9gi Polg\u00e1ri V\u00e9grehajt\u00f3 \u00c1g (FCEB) \u00fcgyn\u00f6ks\u00e9gei, amelyek a <a class=\"\" href=\"https:\/\/www.cisa.gov\/news-events\/directives\/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities\">K\u00f6telez\u0151 M\u0171k\u00f6d\u00e9si Ir\u00e1nyelv 22-01<\/a> hat\u00e1lya al\u00e1 tartoznak, k\u00f6telesek a KEV-list\u00e1n szerepl\u0151 s\u00e9r\u00fcl\u00e9kenys\u00e9geket az el\u0151\u00edrt hat\u00e1rid\u0151k\u00f6n bel\u00fcl orvosolni. Az ir\u00e1nyelv struktur\u00e1lt, priorit\u00e1sos v\u00e1laszt \u00edr el\u0151 az akt\u00edvan kihaszn\u00e1lt CVE-kre a korm\u00e1nyzati h\u00e1l\u00f3zatok er\u0151sebb biztons\u00e1gi poz\u00edci\u00f3inak \u00e9rdek\u00e9ben.<br>B\u00e1r az ir\u00e1nyelv a sz\u00f6vets\u00e9gi \u00fcgyn\u00f6ks\u00e9geket c\u00e9lozza meg, a CISA hat\u00e1rozottan javasolja, hogy minden szervezet\u2014mag\u00e1nv\u00e1llalatok, kritikus infrastrukt\u00fara-szolg\u00e1ltat\u00f3k \u00e9s SaaS-gy\u00e1rt\u00f3k\u2014haszn\u00e1lj\u00e1k a KEV katal\u00f3gust s\u00fcrg\u0151s orvosl\u00e1si listak\u00e9nt.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"expert-advice-for-security-teams\"><strong>Szak\u00e9rt\u0151i Tan\u00e1cs Biztons\u00e1gi Csapatoknak<\/strong><\/h2>\n\n\n<p>A Biztons\u00e1gi T\u00e1j\u00e9koztat\u00f3n\u00e1l s\u00fcrgetj\u00fck a Commvault vagy Yii telep\u00edt\u00e9seket fel\u00fcgyel\u0151 adminisztr\u00e1torokat az azonnali cselekv\u00e9sre:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ellen\u0151rizzen minden Commvault Command Center \u00e9s Yii alap\u00fa webalkalmaz\u00e1s telep\u00edt\u00e9st.<\/li>\n\n\n\n<li>Jav\u00edtsa vagy alkalmazzon enyh\u00edt\u0151 int\u00e9zked\u00e9seket a lehet\u0151 leghamarabb. A nyilv\u00e1nosan kihaszn\u00e1lt s\u00e9r\u00fcl\u00e9kenys\u00e9gek jav\u00edt\u00e1s\u00e1nak hosszabb k\u00e9sedelme k\u00f6zvetlen kompromitt\u00e1l\u00e1shoz vezethet.<\/li>\n\n\n\n<li>Alkalmazzon f\u00e1jlhozz\u00e1f\u00e9r\u00e9s-ellen\u0151rz\u00e9seket \u00e9s webalkalmaz\u00e1s-t\u0171zfalakat (WAF) az \u00fatvonal bej\u00e1r\u00e1si vagy alternat\u00edv \u00fatvonal hozz\u00e1f\u00e9r\u00e9si k\u00eds\u00e9rletek azonos\u00edt\u00e1s\u00e1ra \u00e9s megel\u0151z\u00e9s\u00e9re.<\/li>\n\n\n\n<li>K\u00f6vesse nyomon a CISA KEV Katal\u00f3gus\u00e1t heti rendszeress\u00e9ggel\u2014\u00e9p\u00edtse be az automatiz\u00e1lt s\u00e9r\u00fcl\u00e9kenys\u00e9g-ellen\u0151rz\u00e9si \u00e9s orvosl\u00e1si folyamatokba.<\/li>\n\n\n\n<li>Ellen\u0151rizze a hozz\u00e1f\u00e9r\u00e9si napl\u00f3kat \u00e9s v\u00e9gezzen fenyeget\u00e9svad\u00e1szatot b\u00e1rmilyen kor\u00e1bbi kihaszn\u00e1l\u00e1s jele ut\u00e1n, k\u00fcl\u00f6n\u00f6sen a k\u00fcls\u0151leg szemben\u00e9z\u0151 rendszerekben.<\/li>\n<\/ul>\n\n\n\n<p><strong>Z\u00e1r\u00f3 Gondolat:<\/strong> A CISA folyamatos friss\u00edt\u00e9sei a KEV katal\u00f3gusban l\u00e9tfontoss\u00e1g\u00fa figyelmeztet\u0151 rendszert jelentenek. E figyelmeztet\u00e9sek figyelmen k\u00edv\u00fcl hagy\u00e1sa ugyanaz, mint a j\u00f3l ismert bel\u00e9p\u00e9si pontok nyitva tart\u00e1sa a kiberb\u0171n\u00f6z\u0151k sz\u00e1m\u00e1ra, akik akt\u00edvan kihaszn\u00e1lj\u00e1k azokat. F\u00fcggetlen\u00fcl att\u00f3l, hogy a mag\u00e1n- vagy k\u00f6zszektorhoz tartozik, kezelje a KEV minden egyes hozz\u00e1ad\u00e1s\u00e1t a legmagasabb priorit\u00e1ssal. A proakt\u00edv s\u00e9r\u00fcl\u00e9kenys\u00e9gkezel\u00e9s m\u00e1r nem v\u00e1laszt\u00e1s\u2014sz\u00fcks\u00e9gszer\u0171s\u00e9g a modern v\u00e1llalat biztons\u00e1g\u00e1hoz.<\/p>","protected":false},"excerpt":{"rendered":"<p>A Kiberbiztons\u00e1gi \u00e9s Infrastrukt\u00fara Biztons\u00e1gi \u00dcgyn\u00f6ks\u00e9g (CISA) ism\u00e9t friss\u00edtette az ismert kihaszn\u00e1lt sebezhet\u0151s\u00e9gek katal\u00f3gus\u00e1t (KEV) \u2013 egy kritikus inform\u00e1ci\u00f3forr\u00e1st mind a sz\u00f6vets\u00e9gi, mind a mag\u00e1nszektor v\u00e9delmez\u0151i sz\u00e1m\u00e1ra. 2025. m\u00e1jus 2-\u00e1n,\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-ket-magas-kockazatu-sebezhetoseget-ad-hozza-a-kihasznalt-katalogushoz-mit-kell-most-tenniuk-a-biztonsagi-csapatoknak\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A CISA k\u00e9t magas kock\u00e1zat\u00fa sebezhet\u0151s\u00e9get adott hozz\u00e1 a kihaszn\u00e1lt katal\u00f3gushoz: Mit kell most tenni\u00fck a biztons\u00e1gi csapatoknak<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3798,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-3797","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-ket-magas-kockazatu-sebezhetoseget-ad-hozza-a-kihasznalt-katalogushoz-mit-kell-most-tenniuk-a-biztonsagi-csapatoknak\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) again refreshed its Known Exploited Vulnerabilities Catalog (KEV)\u2014a critical source of information for both federal and private sector defenders. On May 2, 2025,&hellip; Continue reading CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-ket-magas-kockazatu-sebezhetoseget-ad-hozza-a-kihasznalt-katalogushoz-mit-kell-most-tenniuk-a-biztonsagi-csapatoknak\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-04T19:25:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-04T19:25:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"966\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now\",\"datePublished\":\"2025-05-04T19:25:49+00:00\",\"dateModified\":\"2025-05-04T19:25:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\"},\"wordCount\":464,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\",\"name\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"datePublished\":\"2025-05-04T19:25:49+00:00\",\"dateModified\":\"2025-05-04T19:25:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"width\":966,\"height\":425,\"caption\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A CISA k\u00e9t magas kock\u00e1zat\u00fa sebezhet\u0151s\u00e9get adott hozz\u00e1 a kihaszn\u00e1lt katal\u00f3gushoz: Mit kell most tenni\u00fck a biztons\u00e1gi csapatoknak | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-ket-magas-kockazatu-sebezhetoseget-ad-hozza-a-kihasznalt-katalogushoz-mit-kell-most-tenniuk-a-biztonsagi-csapatoknak\/","og_locale":"hu_HU","og_type":"article","og_title":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) again refreshed its Known Exploited Vulnerabilities Catalog (KEV)\u2014a critical source of information for both federal and private sector defenders. On May 2, 2025,&hellip; Continue reading CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now","og_url":"https:\/\/securitybriefing.net\/hu\/hirek\/a-cisa-ket-magas-kockazatu-sebezhetoseget-ad-hozza-a-kihasznalt-katalogushoz-mit-kell-most-tenniuk-a-biztonsagi-csapatoknak\/","og_site_name":"Security Briefing","article_published_time":"2025-05-04T19:25:49+00:00","article_modified_time":"2025-05-04T19:25:53+00:00","og_image":[{"width":966,"height":425,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"3 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now","datePublished":"2025-05-04T19:25:49+00:00","dateModified":"2025-05-04T19:25:53+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/"},"wordCount":464,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","articleSection":["News"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/","url":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/","name":"A CISA k\u00e9t magas kock\u00e1zat\u00fa sebezhet\u0151s\u00e9get adott hozz\u00e1 a kihaszn\u00e1lt katal\u00f3gushoz: Mit kell most tenni\u00fck a biztons\u00e1gi csapatoknak | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","datePublished":"2025-05-04T19:25:49+00:00","dateModified":"2025-05-04T19:25:53+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","width":966,"height":425,"caption":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/3797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=3797"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/3797\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/3798"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=3797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=3797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=3797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}