{"id":3572,"date":"2025-03-19T21:49:44","date_gmt":"2025-03-19T21:49:44","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3572"},"modified":"2025-03-19T21:49:48","modified_gmt":"2025-03-19T21:49:48","slug":"il-cisa-aggiunge-tre-nuove-vulnerabilita-allelenco-delle-piu-pericolose-cosa-ce-da-sapere","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/it\/notizie\/il-cisa-aggiunge-tre-nuove-vulnerabilita-allelenco-delle-piu-pericolose-cosa-ce-da-sapere\/","title":{"rendered":"Il CISA aggiunge tre nuove vulnerabilit\u00e0 all'elenco delle pi\u00f9 pericolose: Cosa c'\u00e8 da sapere"},"content":{"rendered":"<p>La Cybersecurity and Infrastructure Security Agency (CISA) ha appena annunciato l'ultimo Known Exploited Vulnerabilities (KEV) Catalog con tre nuove debolezze di sicurezza che gli hacker stanno attualmente sfruttando per penetrare nei sistemi. L'importanza di questo avviso si basa sul fatto che gli avvertimenti della CISA non indicano una sorta di situazione teorica: queste vulnerabilit\u00e0 sono definitive, nel senso che vengono effettivamente compromesse per attacchi reali.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-was-added\"><strong>Cosa \u00e8 stato aggiunto?<\/strong><\/h2>\n\n\n<p>Traduciamo queste tre vulnerabilit\u00e0 in linguaggio quotidiano:<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"1-edimax-ip-camera-vulnerability-cve20251316\"><strong>1. Vulnerabilit\u00e0 della telecamera IP Edimax (CVE-2025-1316)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg\" alt=\"Vulnerabilit\u00e0 delle telecamere IP Edimax\" class=\"wp-image-3574\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Il problema di sicurezza menzionato in <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1316\">le telecamere di sicurezza Edimax IC-7100<\/a> si riferisce alla cosiddetta \"iniezione di comandi\". L'idea \u00e8 che gli aggressori possano indurre la telecamera a eseguire codice dannoso. Se queste telecamere sono installate a casa o in ufficio, potrebbero essere prese di mira da utenti non autorizzati, che potrebbero accedere ai feed delle telecamere, modificare le impostazioni o utilizzarle per attaccare altri dispositivi della rete.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"2-nakivo-backup-software-vulnerability-cve202448248\"><strong>2. Vulnerabilit\u00e0 del software di backup NAKIVO (CVE-2024-48248)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg\" alt=\"Vulnerabilit\u00e0 del software di backup NAKIVO\" class=\"wp-image-3575\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.nakivo.com\/\">NAKIVO<\/a> sviluppa soluzioni di backup e ripristino utilizzate da molte aziende per garantire la protezione dei dati. La falla in questione \u00e8 chiamata \"<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/36.html\">attraversamento del percorso assoluto<\/a>che consente agli aggressori di accedere a file che non dovrebbero vedere. Questo \u00e8 particolarmente rischioso nel caso dei software di backup, che spesso contengono dati sensibili. Gli intrusi che compromettono questa vulnerabilit\u00e0 possono accedere, rubare o cancellare i dati di backup.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"3-sap-netweaver-vulnerability-cve201712637\"><strong>3. Vulnerabilit\u00e0 di SAP NetWeaver (CVE-2017-12637)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg\" alt=\"Vulnerabilit\u00e0 di SAP NetWeaver\" class=\"wp-image-3576\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Si tratta di un dato particolarmente critico, poich\u00e9 risale al 2017, ovvero a quasi otto anni fa. SAP NetWeaver \u00e8 una delle piattaforme tecnologiche che eseguono diverse applicazioni aziendali critiche. Questa lacuna \u00e8 esattamente il tipo di cosa che renderebbe un \"<a href=\"https:\/\/portswigger.net\/web-security\/file-path-traversal\">attraversamento delle directory<\/a>\" dove, a causa di essa, gli intrusi potevano entrare in possesso di file e directory non consentiti. Il fatto che molti sistemi non siano interessati dalla patch, anche dopo tanti anni, \u00e8 il motivo per cui gli aggressori la stanno sfruttando.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-this-matters-to-everyone\"><strong>Perch\u00e9 \u00e8 importante per tutti<\/strong><\/h2>\n\n\n<p>Sebbene le linee guida della CISA siano obbligatorie solo per le autorit\u00e0 governative federali, il loro catalogo KEV \u00e8 stato definito come la fonte pi\u00f9 aggiornata per la scelta dei bug pi\u00f9 cruciali da correggere. Una volta che un bug \u00e8 stato incluso in questo elenco, significa quanto segue:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Gli hacker utilizzano queste vulnerabilit\u00e0<\/li>\n\n\n\n<li>Gli attacchi hanno avuto un tale successo che sono gi\u00e0 arrivati a livello nazionale<\/li>\n\n\n\n<li>Il danno potenziale di queste vulnerabilit\u00e0 \u00e8 notevole<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-should-you-do\"><strong>Cosa fare?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"for-home-users\"><strong>Per gli utenti privati:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Se si dispone di telecamere Edimax, controllare il sito Web del produttore per verificare se sono stati rilasciati aggiornamenti del firmware.<\/li>\n\n\n\n<li>Assicuratevi che i vostri dispositivi abbiano tutte le patch di sicurezza necessarie.<\/li>\n\n\n\n<li>Pensate ai vecchi dispositivi nuovi di zecca che difficilmente riceveranno le patch di sicurezza.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-business-users\"><strong>Per gli utenti aziendali:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Includere nell'inventario i prodotti interessati (telecamere Edimax, software di backup NAKIVO o SAP NetWeaver) utilizzati dall'organizzazione.<\/li>\n\n\n\n<li>Mettete la patch di questi sistemi in cima alla vostra lista di cose da fare.<\/li>\n\n\n\n<li>Se non \u00e8 possibile installare immediatamente la patch, si deve cercare di ridurre al minimo il danno potenziale isolando il resto della rete tramite la segmentazione della rete.<\/li>\n\n\n\n<li>Esaminate le vostre routine di backup per assicurarvi di avere copie non infette da ripristinare in caso di violazione.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-it-professionals\"><strong>Per i professionisti IT:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Approfittate del <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">Catalogo KEV by CISA<\/a>che \u00e8 praticamente una scorecard per il vostro programma di gestione delle vulnerabilit\u00e0.<\/li>\n\n\n\n<li>Non dimenticate i vecchi sistemi che potrebbero eseguire versioni obsolete della piattaforma SAP NetWeaver durante l'aggiornamento.<\/li>\n\n\n\n<li>Forse \u00e8 il caso di eseguire una scansione delle vulnerabilit\u00e0 pi\u00f9 frequente per i sistemi pi\u00f9 importanti.<\/li>\n\n\n\n<li>In questo caso, elaborate un piano fulmineo su come affrontare le situazioni pi\u00f9 critiche mentre sono ancora nel momento presente.<\/li>\n<\/ul>\n\n\n\n<p>L'esempio di una vulnerabilit\u00e0 risalente a 8 anni fa \u00e8 una grande lezione per capire che il processo di <a href=\"https:\/\/securitybriefing.net\/it\/ai-lapproccio-di-un-executive-architect-a-finops-come-lia-e-lautomazione-semplificano-la-gestione-dei-dati-ottobre-2024-%c2%b7-cesar-daniel-barreto\/sicurezza-informatica\/\">sicurezza informatica <\/a>non ha mai fine. Ci sono molte aziende che utilizzano ancora software vecchi che potrebbero avere vulnerabilit\u00e0 ben note, e questo porta alla circostanza in cui gli aggressori hanno un problema sulla loro strada. Per questo motivo, \u00e8 necessario aggiornare regolarmente il software e i sistemi, oltre a patch e valutazioni di sicurezza che possono essere eseguite per le macchine funzionanti.<\/p>\n\n\n\n<p>Tenete presente che quando la CISA aggiorna il suo catalogo KEV, non si tratta solo di un'altra debolezza, ma di una scappatoia di sicurezza che gli aggressori stanno sfruttando ampiamente per infettare e rubare i dati. Siate rapidi e fate parte di una nuova amministrazione che non dovr\u00e0 affrontare le difficolt\u00e0 causate da una violazione del malware.<\/p>","protected":false},"excerpt":{"rendered":"<p>La Cybersecurity and Infrastructure Security Agency (CISA) ha appena annunciato l'ultimo Known Exploited Vulnerabilities (KEV) Catalog con tre nuove debolezze di sicurezza che gli hacker stanno attualmente sfruttando per introdursi nei sistemi.... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/it\/notizie\/il-cisa-aggiunge-tre-nuove-vulnerabilita-allelenco-delle-piu-pericolose-cosa-ce-da-sapere\/\">Continue reading <span class=\"screen-reader-text\">Il CISA aggiunge tre nuove vulnerabilit\u00e0 all'elenco delle pi\u00f9 pericolose: Cosa c'\u00e8 da sapere<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3573,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-3572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/it\/notizie\/il-cisa-aggiunge-tre-nuove-vulnerabilita-allelenco-delle-piu-pericolose-cosa-ce-da-sapere\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Continua a leggere CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/it\/notizie\/il-cisa-aggiunge-tre-nuove-vulnerabilita-allelenco-delle-piu-pericolose-cosa-ce-da-sapere\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T21:49:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T21:49:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"966\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"wordCount\":757,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"name\":\"CISA Adds Three New Vulnerabilities to Their \\\"Most Dangerous\\\" List: What You Need to Know | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"width\":966,\"height\":425,\"caption\":\"CISA Adds Three New Vulnerabilities to Their Most Dangerous List\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/it\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA Aggiunge Tre Nuove Vulnerabilit\u00e0 alla Loro Lista \"Pi\u00f9 Pericolosa\": Cosa Devi Sapere | Briefing sulla Sicurezza","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/it\/notizie\/il-cisa-aggiunge-tre-nuove-vulnerabilita-allelenco-delle-piu-pericolose-cosa-ce-da-sapere\/","og_locale":"it_IT","og_type":"article","og_title":"CISA Adds Three New Vulnerabilities to Their \"Most Dangerous\" List: What You Need to Know | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Continua a leggere CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","og_url":"https:\/\/securitybriefing.net\/it\/notizie\/il-cisa-aggiunge-tre-nuove-vulnerabilita-allelenco-delle-piu-pericolose-cosa-ce-da-sapere\/","og_site_name":"Security Briefing","article_published_time":"2025-03-19T21:49:44+00:00","article_modified_time":"2025-03-19T21:49:48+00:00","og_image":[{"width":966,"height":425,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"C\u00e9sar Daniel Barreto","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"wordCount":757,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","articleSection":["News"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","name":"CISA Aggiunge Tre Nuove Vulnerabilit\u00e0 alla Loro Lista \"Pi\u00f9 Pericolosa\": Cosa Devi Sapere | Briefing sulla Sicurezza","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","width":966,"height":425,"caption":"CISA Adds Three New Vulnerabilities to Their Most Dangerous List"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Briefing sulla sicurezza","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Briefing sulla sicurezza","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"Cesare Daniele Barreto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u00e8 uno stimato scrittore ed esperto di cybersecurity, noto per la sua conoscenza approfondita e la capacit\u00e0 di semplificare argomenti complessi di sicurezza informatica. Con una vasta esperienza nel campo della sicurezza di rete e della protezione dei dati, contribuisce regolarmente con articoli e analisi approfondite sulle ultime tendenze della cybersecurity, educando sia i professionisti che il pubblico.","url":"https:\/\/securitybriefing.net\/it\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/3572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/comments?post=3572"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/3572\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media\/3573"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media?parent=3572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/categories?post=3572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/tags?post=3572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}