CISA Adds Three New Vulnerabilities to Their “Most Dangerous” List: What You Need to Know
March 19, 2025 • César Daniel Barreto

The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems. The significance of this notice is based on the fact that the CISA warnings do not indicate some kind of theoretical situation – these vulnerabilities are definite ones in the sense that they are actually being compromised for real attacks.
What Was Added?
Let’s translate these three vulnerabilities into everyday language:
1. Edimax IP Camera Vulnerability (CVE-2025-1316)

The mentioned security problem in the Edimax IC-7100 security cameras refers to the so-called “command injection.” The idea is that attackers can get the camera to execute harmful code. With these cameras set up at home or office, they might be targeted by non-authorized users, who could gain access to your camera feeds, change settings, or use these cameras to attack other devices on your network.
2. NAKIVO Backup Software Vulnerability (CVE-2024-48248)

NAKIVO develops backup and recovery solutions that are used by many businesses to ensure data protection. The flaw in question is called the “absolute path traversal,” which allows attackers to gain access to files they are not supposed to see. This is particularly risky in the case of backup software where backups often contain sensitive data. Intruders who compromise this vulnerability can possibly access, steal, or delete the backed-up data.
3. SAP NetWeaver Vulnerability (CVE-2017-12637)

This is particularly critical since it came from 2017 which is quite a long time back – that is almost eight years. SAP NetWeaver is one of the technology platforms that perform various critical business applications. That gap is exactly the kind of thing that would make a “directory traversal” where, because of it, intruders could get hold of off-limit files and directories. The fact that many systems are unaffected by the patch, even after so many years, is the reason attackers are now exploiting it.
Why This Matters to Everyone
Although CISA’s guidelines are only mandatory for federal government authorities, their KEV Catalog has been set as the most updated source for choosing the most crucial bugs to be fixed. Once a bug is included in this list, it means the following:
- Hackers use these vulnerabilities
- The attacks are so successful that they have already come to the national level
- The potential damage from these vulnerabilities is substantial
What Should You Do?
For Home Users:
- If you have Edimax cameras, then check the website of the manufacturer to see if they have issued firmware updates
- Make sure your devices have all the necessary security patches
- Think over the brand-new old devices that are unlikely to get the security patches anymore
For Business Users:
- Include in your inventory what are the affected products (Edimax cameras, NAKIVO backup software, or SAP NetWeaver) your organization uses
- Put the patching of these systems on top of your to-do list
- If you cannot immediately install the patch, then you should try to minimize the potential damage by isolating the rest of the network by network segmentation
- Go through your backup routines to ensure you have uninfected copies to restore in case of a breach
For IT Professionals:
- Take advantage of the KEV Catalog by CISA, which is practically a scorecard for your vulnerability management program
- Do not forget old systems that might be running outdated versions of the SAP NetWeaver platform during the update
- Maybe you might want to go to the point of performing more frequent vulnerability scanning for the very important systems
- In this case, come up with a lightning-speed plan about how to deal with the most critical situations while they are still in the present moment
The example of a vulnerability from 8 years ago is a great lesson to understand that the process of cybersecurity is never-ending. There are a lot of companies that still use older software that might have well-known vulnerabilities, and that leads to the circumstance where attackers have a problem in their way. Thus, this necessitates regular updates of the software and systems, as well as patches and security assessments that could be done for the functioning machines.
Keep in mind that when CISA updates its KEV Catalog, it is not just another weakness – it is actually a security loophole that attackers are widely using at the moment to infect and steal data. Be quick about it and be part of a new administration that won’t face difficulties brought about by a malware breach.

César Daniel Barreto
César Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.