{"id":3572,"date":"2025-03-19T21:49:44","date_gmt":"2025-03-19T21:49:44","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3572"},"modified":"2025-03-19T21:49:48","modified_gmt":"2025-03-19T21:49:48","slug":"cisa-adauga-trei-noi-vulnerabilitati-pe-lista-celor-mai-periculoase-ceea-ce-trebuie-sa-stiti","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/stiri\/cisa-adauga-trei-noi-vulnerabilitati-pe-lista-celor-mai-periculoase-ceea-ce-trebuie-sa-stiti\/","title":{"rendered":"CISA adaug\u0103 trei noi vulnerabilit\u0103\u021bi pe lista \"celor mai periculoase\": Ce trebuie s\u0103 \u0219ti\u021bi"},"content":{"rendered":"<p>Agen\u021bia pentru securitate cibernetic\u0103 \u0219i securitate a infrastructurii (CISA) tocmai a anun\u021bat cel mai recent catalog de vulnerabilit\u0103\u021bi exploatate cunoscute (KEV) cu trei noi puncte slabe de securitate pe care hackerii le exploateaz\u0103 \u00een prezent pentru a p\u0103trunde \u00een sisteme. Semnifica\u021bia acestui anun\u021b se bazeaz\u0103 pe faptul c\u0103 avertismentele CISA nu indic\u0103 un fel de situa\u021bie teoretic\u0103 - aceste vulnerabilit\u0103\u021bi sunt certe, \u00een sensul c\u0103 sunt efectiv compromise pentru atacuri reale.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-was-added\"><strong>Ce a fost ad\u0103ugat?<\/strong><\/h2>\n\n\n<p>S\u0103 traducem aceste trei vulnerabilit\u0103\u021bi \u00een limbajul cotidian:<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"1-edimax-ip-camera-vulnerability-cve20251316\"><strong>1. Vulnerabilitatea camerei IP Edimax (CVE-2025-1316)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg\" alt=\"Vulnerabilitatea camerelor IP Edimax\" class=\"wp-image-3574\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Problema de securitate men\u021bionat\u0103 \u00een <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1316\">camerele de securitate Edimax IC-7100<\/a> se refer\u0103 la a\u0219a-numita \"injectare de comenzi\". Ideea este c\u0103 atacatorii pot determina camera s\u0103 execute cod d\u0103un\u0103tor. \u00cen cazul \u00een care aceste camere sunt instalate acas\u0103 sau la birou, ele ar putea fi vizate de utilizatori neautoriza\u021bi, care ar putea ob\u021bine acces la fluxurile camerelor, ar putea modifica set\u0103rile sau ar putea utiliza aceste camere pentru a ataca alte dispozitive din re\u021bea.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"2-nakivo-backup-software-vulnerability-cve202448248\"><strong>2. Vulnerabilitatea software-ului de backup NAKIVO (CVE-2024-48248)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg\" alt=\"Vulnerabilitatea software-ului de backup NAKIVO\" class=\"wp-image-3575\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.nakivo.com\/\">NAKIVO<\/a> dezvolt\u0103 solu\u021bii de backup \u0219i recuperare care sunt utilizate de multe \u00eentreprinderi pentru a asigura protec\u021bia datelor. Defectul \u00een cauz\u0103 se nume\u0219te \"<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/36.html\">traversarea c\u0103ii absolute<\/a>,\" care permite atacatorilor s\u0103 ob\u021bin\u0103 acces la fi\u0219iere pe care nu ar trebui s\u0103 le vad\u0103. Acest lucru este deosebit de riscant \u00een cazul software-ului de backup, unde copiile de siguran\u021b\u0103 con\u021bin adesea date sensibile. Intru\u0219ii care compromit aceast\u0103 vulnerabilitate pot, eventual, s\u0103 acceseze, s\u0103 fure sau s\u0103 \u0219tearg\u0103 datele salvate.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"3-sap-netweaver-vulnerability-cve201712637\"><strong>3. Vulnerabilitatea SAP NetWeaver (CVE-2017-12637)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg\" alt=\"Vulnerabilitatea SAP NetWeaver\" class=\"wp-image-3576\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Acest lucru este deosebit de critic, deoarece a venit din 2017, ceea ce este destul de mult timp \u00een urm\u0103 - adic\u0103 aproape opt ani. SAP NetWeaver este una dintre platformele tehnologice care realizeaz\u0103 diverse aplica\u021bii de afaceri esen\u021biale. Acest decalaj este exact genul de lucru care ar face un \"<a href=\"https:\/\/portswigger.net\/web-security\/file-path-traversal\">traversarea directoarelor<\/a>\", unde, din cauza acestuia, intru\u0219ii puteau face rost de fi\u0219iere \u0219i directoare interzise. Faptul c\u0103 multe sisteme nu sunt afectate de patch, chiar \u0219i dup\u0103 at\u00e2\u021bia ani, este motivul pentru care atacatorii \u00eel exploateaz\u0103 acum.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-this-matters-to-everyone\"><strong>De ce acest lucru este important pentru toat\u0103 lumea<\/strong><\/h2>\n\n\n<p>De\u0219i liniile directoare ale CISA sunt obligatorii doar pentru autorit\u0103\u021bile guvernamentale federale, catalogul KEV al acestora a fost stabilit ca fiind cea mai actualizat\u0103 surs\u0103 pentru alegerea celor mai importante erori care trebuie remediate. Odat\u0103 ce o eroare este inclus\u0103 \u00een aceast\u0103 list\u0103, aceasta \u00eenseamn\u0103 urm\u0103toarele:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hackerii folosesc aceste vulnerabilit\u0103\u021bi<\/li>\n\n\n\n<li>Atacurile sunt at\u00e2t de reu\u0219ite \u00eenc\u00e2t au ajuns deja la nivel na\u021bional<\/li>\n\n\n\n<li>Pagubele poten\u021biale cauzate de aceste vulnerabilit\u0103\u021bi sunt substan\u021biale<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-should-you-do\"><strong>Ce ar trebui s\u0103 face\u021bi?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"for-home-users\"><strong>Pentru utilizatorii casnici:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Dac\u0103 ave\u021bi camere Edimax, verifica\u021bi site-ul web al produc\u0103torului pentru a vedea dac\u0103 acesta a emis actualiz\u0103ri de firmware<\/li>\n\n\n\n<li>Asigura\u021bi-v\u0103 c\u0103 dispozitivele dvs. au toate patch-urile de securitate necesare<\/li>\n\n\n\n<li>G\u00e2ndi\u021bi-v\u0103 la dispozitivele vechi nou-nou\u021be care este pu\u021bin probabil s\u0103 mai primeasc\u0103 patch-uri de securitate<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-business-users\"><strong>Pentru utilizatorii de afaceri:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Include\u021bi \u00een inventarul dvs. care sunt produsele afectate (camere Edimax, software de backup NAKIVO sau SAP NetWeaver) pe care le utilizeaz\u0103 organiza\u021bia dvs.<\/li>\n\n\n\n<li>Pune\u021bi remedierea acestor sisteme pe primul loc pe lista de lucruri de f\u0103cut<\/li>\n\n\n\n<li>Dac\u0103 nu pute\u021bi instala imediat patch-ul, atunci ar trebui s\u0103 \u00eencerca\u021bi s\u0103 minimiza\u021bi poten\u021bialele daune prin izolarea restului re\u021belei prin segmentarea re\u021belei<\/li>\n\n\n\n<li>Parcurge\u021bi rutinele de backup pentru a v\u0103 asigura c\u0103 ave\u021bi copii neinfectate pe care s\u0103 le restaura\u021bi \u00een cazul unei bre\u0219e<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-it-professionals\"><strong>Pentru profesioni\u0219tii IT:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Profita\u021bi de <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">KEV Catalog de CISA<\/a>, care este practic un tablou de bord pentru programul dumneavoastr\u0103 de gestionare a vulnerabilit\u0103\u021bilor<\/li>\n\n\n\n<li>Nu uita\u021bi de sistemele vechi care ar putea rula versiuni \u00eenvechite ale platformei SAP NetWeaver \u00een timpul actualiz\u0103rii<\/li>\n\n\n\n<li>Poate c\u0103 a\u021bi dori s\u0103 efectua\u021bi mai frecvent scan\u0103ri ale vulnerabilit\u0103\u021bilor pentru sistemele foarte importante<\/li>\n\n\n\n<li>\u00cen acest caz, elabora\u021bi un plan rapid cu privire la modul de abordare a celor mai critice situa\u021bii \u00een timp ce acestea sunt \u00eenc\u0103 \u00een momentul prezent<\/li>\n<\/ul>\n\n\n\n<p>Exemplul unei vulnerabilit\u0103\u021bi de acum 8 ani este o lec\u021bie excelent\u0103 pentru a \u00een\u021belege c\u0103 procesul de <a href=\"https:\/\/securitybriefing.net\/ro\/ai-abordarea-unui-executive-architect-la-finops-cum-ai-si-automatizarea-simplifica-gestionarea-datelor-octombrie-2024-%c2%b7-cesar-daniel-barreto\/securitate-cibernetica\/\">securitate cibernetic\u0103 <\/a>este f\u0103r\u0103 sf\u00e2r\u0219it. Exist\u0103 o mul\u021bime de companii care \u00eenc\u0103 folosesc software mai vechi care ar putea avea vulnerabilit\u0103\u021bi bine cunoscute, ceea ce duce la situa\u021bia \u00een care atacatorii au o problem\u0103 \u00een calea lor. Astfel, este nevoie de actualiz\u0103ri regulate ale software-ului \u0219i sistemelor, precum \u0219i de patch-uri \u0219i evalu\u0103ri de securitate care ar putea fi efectuate pentru ma\u0219inile func\u021bionale.<\/p>\n\n\n\n<p>Re\u021bine\u021bi c\u0103, atunci c\u00e2nd CISA \u00ee\u0219i actualizeaz\u0103 catalogul KEV, nu este vorba doar de un alt punct slab, ci de fapt de o bre\u0219\u0103 de securitate pe care atacatorii o folosesc pe scar\u0103 larg\u0103 \u00een prezent pentru a infecta \u0219i fura date. Ac\u021biona\u021bi rapid \u0219i face\u021bi parte dintr-o nou\u0103 administra\u021bie care nu se va confrunta cu dificult\u0103\u021bi cauzate de o bre\u0219\u0103 malware.<\/p>","protected":false},"excerpt":{"rendered":"<p>Agen\u021bia pentru Securitate Cibernetic\u0103 \u0219i Securitate a Infrastructurii (CISA) tocmai a anun\u021bat cel mai recent Catalog al Vulnerabilit\u0103\u021bilor Exploatate Cunoscute (KEV) cu trei noi puncte slabe de securitate pe care hackerii le exploateaz\u0103 \u00een prezent pentru a intra \u00een sisteme.... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/stiri\/cisa-adauga-trei-noi-vulnerabilitati-pe-lista-celor-mai-periculoase-ceea-ce-trebuie-sa-stiti\/\">Continue reading <span class=\"screen-reader-text\">CISA adaug\u0103 trei noi vulnerabilit\u0103\u021bi pe lista \"celor mai periculoase\": Ce trebuie s\u0103 \u0219ti\u021bi<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3573,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-3572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/stiri\/cisa-adauga-trei-noi-vulnerabilitati-pe-lista-celor-mai-periculoase-ceea-ce-trebuie-sa-stiti\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Continu\u0103 lectura CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/stiri\/cisa-adauga-trei-noi-vulnerabilitati-pe-lista-celor-mai-periculoase-ceea-ce-trebuie-sa-stiti\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T21:49:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T21:49:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"966\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"wordCount\":757,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"name\":\"CISA Adds Three New Vulnerabilities to Their \\\"Most Dangerous\\\" List: What You Need to Know | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"width\":966,\"height\":425,\"caption\":\"CISA Adds Three New Vulnerabilities to Their Most Dangerous List\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA adaug\u0103 trei noi vulnerabilit\u0103\u021bi pe lista lor \"Cele mai periculoase\": Ce trebuie s\u0103 \u0219ti\u021bi | Informare de securitate","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/stiri\/cisa-adauga-trei-noi-vulnerabilitati-pe-lista-celor-mai-periculoase-ceea-ce-trebuie-sa-stiti\/","og_locale":"ro_RO","og_type":"article","og_title":"CISA Adds Three New Vulnerabilities to Their \"Most Dangerous\" List: What You Need to Know | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Continu\u0103 lectura CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","og_url":"https:\/\/securitybriefing.net\/ro\/stiri\/cisa-adauga-trei-noi-vulnerabilitati-pe-lista-celor-mai-periculoase-ceea-ce-trebuie-sa-stiti\/","og_site_name":"Security Briefing","article_published_time":"2025-03-19T21:49:44+00:00","article_modified_time":"2025-03-19T21:49:48+00:00","og_image":[{"width":966,"height":425,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"C\u00e9sar Daniel Barreto","Timp estimat pentru citire":"5 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"wordCount":757,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","articleSection":["News"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","name":"CISA adaug\u0103 trei noi vulnerabilit\u0103\u021bi pe lista lor \"Cele mai periculoase\": Ce trebuie s\u0103 \u0219ti\u021bi | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","width":966,"height":425,"caption":"CISA Adds Three New Vulnerabilities to Their Most Dangerous List"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto este un apreciat scriitor \u0219i expert \u00een securitate cibernetic\u0103, cunoscut pentru cuno\u0219tin\u021bele sale aprofundate \u0219i capacitatea de a simplifica subiecte complexe de securitate cibernetic\u0103. Cu o vast\u0103 experien\u021b\u0103 \u00een securitatea re\u021belelor \u0219i protec\u021bia datelor, el contribuie \u00een mod regulat cu articole \u0219i analize p\u0103trunz\u0103toare privind cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103, educ\u00e2nd at\u00e2t profesioni\u0219tii, c\u00e2t \u0219i publicul.","url":"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/3572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=3572"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/3572\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/3573"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=3572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=3572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=3572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}