{"id":3572,"date":"2025-03-19T21:49:44","date_gmt":"2025-03-19T21:49:44","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3572"},"modified":"2025-03-19T21:49:48","modified_gmt":"2025-03-19T21:49:48","slug":"cisa-voegt-drie-nieuwe-kwetsbaarheden-toe-aan-hun-lijst-met-gevaarlijkste-wat-je-moet-weten","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/nl\/nieuws\/cisa-voegt-drie-nieuwe-kwetsbaarheden-toe-aan-hun-lijst-met-gevaarlijkste-wat-je-moet-weten\/","title":{"rendered":"CISA voegt drie nieuwe kwetsbaarheden toe aan hun \"Meest gevaarlijke\" lijst: Wat u moet weten"},"content":{"rendered":"<p>Het Cybersecurity and Infrastructure Security Agency (CISA) heeft zojuist de nieuwste Known Exploited Vulnerabilities (KEV) catalogus gepubliceerd met drie nieuwe zwakke plekken in de beveiliging die hackers op dit moment misbruiken om in te breken in systemen. Het belang van deze aankondiging is gebaseerd op het feit dat de waarschuwingen van het CISA niet wijzen op een soort theoretische situatie - deze kwetsbaarheden zijn definitief in de zin dat ze daadwerkelijk worden gecompromitteerd voor echte aanvallen.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-was-added\"><strong>Wat is er toegevoegd?<\/strong><\/h2>\n\n\n<p>Laten we deze drie kwetsbaarheden eens vertalen naar alledaagse taal:<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"1-edimax-ip-camera-vulnerability-cve20251316\"><strong>1. Edimax IP Camera Kwetsbaarheid (CVE-2025-1316)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg\" alt=\"Edimax IP Camera Kwetsbaarheid\" class=\"wp-image-3574\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Het genoemde beveiligingsprobleem in <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1316\">de Edimax IC-7100 beveiligingscamera's<\/a> verwijst naar de zogenaamde \"command injection\". Het idee is dat aanvallers de camera schadelijke code kunnen laten uitvoeren. Als deze camera's thuis of op kantoor zijn ge\u00efnstalleerd, kunnen ze het doelwit worden van niet-geautoriseerde gebruikers, die toegang kunnen krijgen tot je camerafeeds, instellingen kunnen wijzigen of deze camera's kunnen gebruiken om andere apparaten in je netwerk aan te vallen.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"2-nakivo-backup-software-vulnerability-cve202448248\"><strong>2. Kwetsbaarheid in de NAKIVO back-upsoftware (CVE-2024-48248)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg\" alt=\"Kwetsbaarheid in NAKIVO Backup Software\" class=\"wp-image-3575\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.nakivo.com\/\">NAKIVO<\/a> ontwikkelt oplossingen voor back-up en herstel die door veel bedrijven worden gebruikt om gegevens te beschermen. De fout in kwestie wordt de \"<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/36.html\">absolute paddoorloop<\/a>,\" waardoor aanvallers toegang kunnen krijgen tot bestanden die ze niet mogen zien. Dit is vooral riskant bij back-upsoftware waar back-ups vaak gevoelige gegevens bevatten. Indringers die deze kwetsbaarheid compromitteren, kunnen mogelijk de back-upgegevens openen, stelen of verwijderen.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"3-sap-netweaver-vulnerability-cve201712637\"><strong>3. SAP NetWeaver kwetsbaarheid (CVE-2017-12637)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg\" alt=\"SAP NetWeaver kwetsbaarheid\" class=\"wp-image-3576\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Dit is met name kritisch omdat het uit 2017 komt, wat behoorlijk lang geleden is - dat is bijna acht jaar. SAP NetWeaver is een van de technologieplatforms die verschillende bedrijfskritische toepassingen uitvoert. Dat gat is precies het soort ding dat een \"<a href=\"https:\/\/portswigger.net\/web-security\/file-path-traversal\">directory traversal<\/a>\", waardoor indringers toegang konden krijgen tot bestanden en mappen die niet toegankelijk waren. Het feit dat veel systemen niet be\u00efnvloed zijn door de patch, zelfs na zoveel jaar, is de reden dat aanvallers er nu misbruik van maken.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-this-matters-to-everyone\"><strong>Waarom dit voor iedereen van belang is<\/strong><\/h2>\n\n\n<p>Hoewel de richtlijnen van CISA alleen verplicht zijn voor federale overheidsinstanties, is hun KEV-catalogus de meest bijgewerkte bron voor het kiezen van de meest cruciale bugs die moeten worden opgelost. Zodra een bug in deze lijst is opgenomen, betekent dit het volgende:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hackers gebruiken deze kwetsbaarheden<\/li>\n\n\n\n<li>De aanvallen zijn zo succesvol dat ze al zijn doorgedrongen tot het nationale niveau<\/li>\n\n\n\n<li>De potenti\u00eble schade van deze kwetsbaarheden is aanzienlijk<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-should-you-do\"><strong>Wat moet je doen?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"for-home-users\"><strong>Voor thuisgebruikers:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Als je Edimax-camera's hebt, kijk dan op de website van de fabrikant of ze firmware-updates hebben uitgebracht<\/li>\n\n\n\n<li>Zorg ervoor dat uw apparaten alle noodzakelijke beveiligingspatches hebben<\/li>\n\n\n\n<li>Denk aan de gloednieuwe oude apparaten die waarschijnlijk geen beveiligingspatches meer krijgen<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-business-users\"><strong>Voor zakelijke gebruikers:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Neem in uw inventarisatie op welke getroffen producten (Edimax-camera's, NAKIVO-back-upsoftware of SAP NetWeaver) uw organisatie gebruikt.<\/li>\n\n\n\n<li>Zet het patchen van deze systemen bovenaan je to-do lijst<\/li>\n\n\n\n<li>Als je de patch niet onmiddellijk kunt installeren, moet je proberen de potenti\u00eble schade te minimaliseren door de rest van het netwerk te isoleren door netwerksegmentatie<\/li>\n\n\n\n<li>Neem uw back-uproutines door om er zeker van te zijn dat u niet-ge\u00efnfecteerde kopie\u00ebn hebt om te herstellen in het geval van een inbreuk<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-it-professionals\"><strong>Voor IT-professionals:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Profiteer van de <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">KEV catalogus van CISA<\/a>wat praktisch een scorekaart is voor uw programma voor kwetsbaarheidsbeheer<\/li>\n\n\n\n<li>Vergeet tijdens de update oude systemen niet die mogelijk verouderde versies van het SAP NetWeaver-platform draaien.<\/li>\n\n\n\n<li>Misschien wilt u vaker scannen op kwetsbaarheden voor de zeer belangrijke systemen<\/li>\n\n\n\n<li>Bedenk in dit geval een bliksemsnel plan over hoe om te gaan met de meest kritieke situaties terwijl ze nog steeds in het huidige moment zijn<\/li>\n<\/ul>\n\n\n\n<p>Het voorbeeld van een kwetsbaarheid van 8 jaar geleden is een geweldige les om te begrijpen dat het proces van <a href=\"https:\/\/securitybriefing.net\/nl\/ai-de-benadering-van-een-executive-architect-voor-finops-hoe-ai-en-automatisering-datamanagement-stroomlijnen-oktober-2024-%c2%b7-cesar-daniel-barreto\/cyberbeveiliging\/\">cyberbeveiliging <\/a>is eindeloos. Er zijn veel bedrijven die nog oudere software gebruiken die bekende kwetsbaarheden kan hebben, en dat leidt tot de omstandigheid dat aanvallers een probleem op hun weg hebben. Dit vereist dus regelmatige updates van de software en systemen, evenals patches en beveiligingsbeoordelingen die kunnen worden uitgevoerd voor de functionerende machines.<\/p>\n\n\n\n<p>Houd in gedachten dat wanneer CISA zijn KEV-catalogus bijwerkt, dit niet zomaar een zwakke plek is - het is in feite een maas in de beveiliging die aanvallers momenteel op grote schaal gebruiken om gegevens te infecteren en te stelen. Wees er snel bij en maak deel uit van een nieuwe administratie die niet in de problemen komt door een malware-inbreuk.<\/p>","protected":false},"excerpt":{"rendered":"<p>Het Cybersecurity and Infrastructure Security Agency (CISA) heeft zojuist de nieuwste Known Exploited Vulnerabilities (KEV)-catalogus gepubliceerd met drie nieuwe zwakke plekken in de beveiliging die hackers momenteel misbruiken om in te breken in systemen..... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/nl\/nieuws\/cisa-voegt-drie-nieuwe-kwetsbaarheden-toe-aan-hun-lijst-met-gevaarlijkste-wat-je-moet-weten\/\">Lees meer verder <span class=\"screen-reader-text\">CISA voegt drie nieuwe kwetsbaarheden toe aan hun \"Meest gevaarlijke\" lijst: Wat u moet weten<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3573,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-3572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/nl\/nieuws\/cisa-voegt-drie-nieuwe-kwetsbaarheden-toe-aan-hun-lijst-met-gevaarlijkste-wat-je-moet-weten\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Lees verder CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/nl\/nieuws\/cisa-voegt-drie-nieuwe-kwetsbaarheden-toe-aan-hun-lijst-met-gevaarlijkste-wat-je-moet-weten\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T21:49:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T21:49:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"966\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"wordCount\":757,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"name\":\"CISA Adds Three New Vulnerabilities to Their \\\"Most Dangerous\\\" List: What You Need to Know | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"width\":966,\"height\":425,\"caption\":\"CISA Adds Three New Vulnerabilities to Their Most Dangerous List\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/nl\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA Voegt Drie Nieuwe Kwetsbaarheden Toe aan Hun \"Meest Gevaarlijke\" Lijst: Wat U Moet Weten | Beveiligingsbriefing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/nl\/nieuws\/cisa-voegt-drie-nieuwe-kwetsbaarheden-toe-aan-hun-lijst-met-gevaarlijkste-wat-je-moet-weten\/","og_locale":"nl_NL","og_type":"article","og_title":"CISA Adds Three New Vulnerabilities to Their \"Most Dangerous\" List: What You Need to Know | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Lees verder CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","og_url":"https:\/\/securitybriefing.net\/nl\/nieuws\/cisa-voegt-drie-nieuwe-kwetsbaarheden-toe-aan-hun-lijst-met-gevaarlijkste-wat-je-moet-weten\/","og_site_name":"Security Briefing","article_published_time":"2025-03-19T21:49:44+00:00","article_modified_time":"2025-03-19T21:49:48+00:00","og_image":[{"width":966,"height":425,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"C\u00e9sar Daniel Barreto","Geschatte leestijd":"5 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"wordCount":757,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","articleSection":["News"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","name":"CISA Voegt Drie Nieuwe Kwetsbaarheden Toe aan Hun \"Meest Gevaarlijke\" Lijst: Wat U Moet Weten | Beveiligingsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","width":966,"height":425,"caption":"CISA Adds Three New Vulnerabilities to Their Most Dangerous List"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Beveiligingsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Beveiligingsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto is een gewaardeerd schrijver en expert op het gebied van cyberbeveiliging, die bekend staat om zijn diepgaande kennis en vermogen om complexe onderwerpen op het gebied van cyberbeveiliging te vereenvoudigen. Met zijn uitgebreide ervaring in netwerkbeveiliging en gegevensbescherming schrijft hij regelmatig inzichtelijke artikelen en analyses over de nieuwste trends op het gebied van cyberbeveiliging, waarmee hij zowel professionals als het publiek voorlicht.","url":"https:\/\/securitybriefing.net\/nl\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts\/3572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/comments?post=3572"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts\/3572\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/media\/3573"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/media?parent=3572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/categories?post=3572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/tags?post=3572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}