{"id":3572,"date":"2025-03-19T21:49:44","date_gmt":"2025-03-19T21:49:44","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3572"},"modified":"2025-03-19T21:49:48","modified_gmt":"2025-03-19T21:49:48","slug":"cisa-lagger-till-tre-nya-sarbarheter-pa-sin-farligaste-lista-vad-du-behover-veta","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/nyheter\/cisa-lagger-till-tre-nya-sarbarheter-pa-sin-farligaste-lista-vad-du-behover-veta\/","title":{"rendered":"CISA l\u00e4gger till tre nya s\u00e5rbarheter p\u00e5 sin \"farligaste\" lista: Vad du beh\u00f6ver veta"},"content":{"rendered":"<p>Cybersecurity and Infrastructure Security Agency (CISA) tillk\u00e4nnagav just den senaste KEV-katalogen (Known Exploited Vulnerabilities) med tre nya s\u00e4kerhetssvagheter som hackare f\u00f6r n\u00e4rvarande utnyttjar f\u00f6r att hacka sig in i system. Betydelsen av detta meddelande baseras p\u00e5 det faktum att CISA-varningarna inte indikerar n\u00e5gon slags teoretisk situation - dessa s\u00e5rbarheter \u00e4r definitiva i den meningen att de faktiskt komprometteras f\u00f6r verkliga attacker.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-was-added\"><strong>Vad har lagts till?<\/strong><\/h2>\n\n\n<p>L\u00e5t oss \u00f6vers\u00e4tta dessa tre s\u00e5rbarheter till vardagsspr\u00e5k:<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"1-edimax-ip-camera-vulnerability-cve20251316\"><strong>1. S\u00e5rbarhet i Edimax IP-kamera (CVE-2025-1316)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg\" alt=\"S\u00e5rbarhet i Edimax IP-kamera\" class=\"wp-image-3574\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Det n\u00e4mnda s\u00e4kerhetsproblemet i <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1316\">Edimax IC-7100 s\u00e4kerhetskameror<\/a> h\u00e4nvisar till den s\u00e5 kallade \"kommandoinjektionen\". Tanken \u00e4r att angripare kan f\u00e5 kameran att exekvera skadlig kod. Med dessa kameror uppsatta hemma eller p\u00e5 kontoret kan de bli m\u00e5ltavlor f\u00f6r obeh\u00f6riga anv\u00e4ndare, som kan f\u00e5 tillg\u00e5ng till kamerafl\u00f6dena, \u00e4ndra inst\u00e4llningar eller anv\u00e4nda kamerorna f\u00f6r att attackera andra enheter i n\u00e4tverket.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"2-nakivo-backup-software-vulnerability-cve202448248\"><strong>2. S\u00e5rbarhet i NAKIVO Backup-programvara (CVE-2024-48248)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg\" alt=\"S\u00e5rbarhet i NAKIVO Backup Software\" class=\"wp-image-3575\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.nakivo.com\/\">NAKIVO<\/a> utvecklar backup- och \u00e5terst\u00e4llningsl\u00f6sningar som anv\u00e4nds av m\u00e5nga f\u00f6retag f\u00f6r att s\u00e4kerst\u00e4lla dataskydd. Felet i fr\u00e5ga kallas f\u00f6r \"<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/36.html\">absolut s\u00f6kv\u00e4gstraversering<\/a>,\" vilket g\u00f6r det m\u00f6jligt f\u00f6r angripare att f\u00e5 tillg\u00e5ng till filer som de inte ska se. Detta \u00e4r s\u00e4rskilt riskabelt n\u00e4r det g\u00e4ller programvara f\u00f6r s\u00e4kerhetskopiering, eftersom s\u00e4kerhetskopior ofta inneh\u00e5ller k\u00e4nsliga data. Inkr\u00e4ktare som kompromissar med denna s\u00e5rbarhet kan eventuellt komma \u00e5t, stj\u00e4la eller radera s\u00e4kerhetskopierade data.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"3-sap-netweaver-vulnerability-cve201712637\"><strong>3. SAP NetWeaver-s\u00e5rbarhet (CVE-2017-12637)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg\" alt=\"S\u00e5rbarhet i SAP NetWeaver\" class=\"wp-image-3576\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>Detta \u00e4r s\u00e4rskilt kritiskt eftersom det kom 2017, vilket \u00e4r ganska l\u00e4nge sedan - det vill s\u00e4ga n\u00e4stan \u00e5tta \u00e5r. SAP NetWeaver \u00e4r en av de teknikplattformar som utf\u00f6r olika kritiska aff\u00e4rsapplikationer. Detta gap \u00e4r exakt den typ av sak som skulle g\u00f6ra en \"<a href=\"https:\/\/portswigger.net\/web-security\/file-path-traversal\">katalogtraversering<\/a>\" d\u00e4r inkr\u00e4ktare p\u00e5 grund av den kunde f\u00e5 tag p\u00e5 filer och kataloger som inte var till\u00e5tna. Det faktum att m\u00e5nga system inte p\u00e5verkas av patchen, trots att det g\u00e5tt s\u00e5 m\u00e5nga \u00e5r, \u00e4r anledningen till att angripare nu utnyttjar den.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-this-matters-to-everyone\"><strong>Varf\u00f6r detta \u00e4r viktigt f\u00f6r alla<\/strong><\/h2>\n\n\n<p>\u00c4ven om CISA:s riktlinjer endast \u00e4r obligatoriska f\u00f6r federala myndigheter, har deras KEV-katalog fastst\u00e4llts som den mest uppdaterade k\u00e4llan f\u00f6r att v\u00e4lja de viktigaste buggarna som ska \u00e5tg\u00e4rdas. N\u00e4r en bugg finns med i denna lista betyder det f\u00f6ljande:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hackare anv\u00e4nder dessa s\u00e5rbarheter<\/li>\n\n\n\n<li>Attackerna \u00e4r s\u00e5 framg\u00e5ngsrika att de redan har kommit till nationell niv\u00e5<\/li>\n\n\n\n<li>Den potentiella skadan av dessa s\u00e5rbarheter \u00e4r betydande<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-should-you-do\"><strong>Vad ska du g\u00f6ra?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"for-home-users\"><strong>F\u00f6r hemanv\u00e4ndare:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Om du har Edimax-kameror, kontrollera tillverkarens webbplats f\u00f6r att se om de har utf\u00e4rdat uppdateringar av firmware<\/li>\n\n\n\n<li>Se till att dina enheter har alla n\u00f6dv\u00e4ndiga s\u00e4kerhetsuppdateringar<\/li>\n\n\n\n<li>T\u00e4nk p\u00e5 de helt nya gamla enheter som sannolikt inte kommer att f\u00e5 s\u00e4kerhetsuppdateringarna l\u00e4ngre<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-business-users\"><strong>F\u00f6r f\u00f6retagsanv\u00e4ndare:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Inkludera i din inventering vilka av de ber\u00f6rda produkterna (Edimax-kameror, NAKIVO-programvara f\u00f6r s\u00e4kerhetskopiering eller SAP NetWeaver) som din organisation anv\u00e4nder<\/li>\n\n\n\n<li>S\u00e4tt patchningen av dessa system h\u00f6gst upp p\u00e5 din att-g\u00f6ra-lista<\/li>\n\n\n\n<li>Om du inte kan installera korrigeringen omedelbart b\u00f6r du f\u00f6rs\u00f6ka minimera den potentiella skadan genom att isolera resten av n\u00e4tverket med hj\u00e4lp av n\u00e4tverkssegmentering<\/li>\n\n\n\n<li>G\u00e5 igenom dina backup-rutiner f\u00f6r att s\u00e4kerst\u00e4lla att du har oinfekterade kopior att \u00e5terst\u00e4lla i h\u00e4ndelse av ett intr\u00e5ng<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-it-professionals\"><strong>F\u00f6r IT-proffs:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Dra nytta av de <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">KEV-katalog av CISA<\/a>som praktiskt taget \u00e4r ett scorecard f\u00f6r ditt program f\u00f6r s\u00e5rbarhetshantering<\/li>\n\n\n\n<li>Gl\u00f6m inte bort gamla system som kanske k\u00f6r f\u00f6r\u00e5ldrade versioner av SAP NetWeaver-plattformen under uppdateringen<\/li>\n\n\n\n<li>Kanske vill du g\u00e5 s\u00e5 l\u00e5ngt som att utf\u00f6ra mer frekventa s\u00e5rbarhetsskanningar f\u00f6r de allra viktigaste systemen<\/li>\n\n\n\n<li>I s\u00e5 fall b\u00f6r du ta fram en blixtsnabb plan f\u00f6r hur du ska hantera de mest kritiska situationerna medan de fortfarande \u00e4r i nuet<\/li>\n<\/ul>\n\n\n\n<p>Exemplet med en s\u00e5rbarhet f\u00f6r 8 \u00e5r sedan \u00e4r en bra lektion f\u00f6r att f\u00f6rst\u00e5 att processen f\u00f6r <a href=\"https:\/\/securitybriefing.net\/sv\/ai-en-executive-architects-tillvagagangssatt-for-finops-hur-ai-och-automation-stromlinjeformar-datastyrning-oktober-2024-%c2%b7-cesar-daniel-barreto\/cybersakerhet\/\">cybers\u00e4kerhet <\/a>\u00e4r o\u00e4ndlig. Det finns m\u00e5nga f\u00f6retag som fortfarande anv\u00e4nder \u00e4ldre programvara som kan ha v\u00e4lk\u00e4nda s\u00e5rbarheter, och det leder till omst\u00e4ndigheten d\u00e4r angripare har ett problem i v\u00e4gen. S\u00e5ledes kr\u00e4ver detta regelbundna uppdateringar av programvaran och systemen, liksom korrigeringar och s\u00e4kerhetsbed\u00f6mningar som kan g\u00f6ras f\u00f6r de fungerande maskinerna.<\/p>\n\n\n\n<p>T\u00e4nk p\u00e5 att n\u00e4r CISA uppdaterar sin KEV-katalog \u00e4r det inte bara ytterligare en svaghet - det \u00e4r faktiskt ett s\u00e4kerhetslucka som angripare i stor utstr\u00e4ckning anv\u00e4nder just nu f\u00f6r att infektera och stj\u00e4la data. Var snabb med det och var en del av en ny administration som inte kommer att m\u00f6ta sv\u00e5righeter som orsakas av ett intr\u00e5ng i skadlig programvara.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and Infrastructure Security Agency (CISA) tillk\u00e4nnagav just den senaste KEV-katalogen (Known Exploited Vulnerabilities) med tre nya s\u00e4kerhetssvagheter som hackare f\u00f6r n\u00e4rvarande utnyttjar f\u00f6r att hacka sig in i system.... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/nyheter\/cisa-lagger-till-tre-nya-sarbarheter-pa-sin-farligaste-lista-vad-du-behover-veta\/\">Continue reading <span class=\"screen-reader-text\">CISA l\u00e4gger till tre nya s\u00e5rbarheter p\u00e5 sin \"farligaste\" lista: Vad du beh\u00f6ver veta<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3573,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-3572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/nyheter\/cisa-lagger-till-tre-nya-sarbarheter-pa-sin-farligaste-lista-vad-du-behover-veta\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Forts\u00e4tt l\u00e4sa CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/nyheter\/cisa-lagger-till-tre-nya-sarbarheter-pa-sin-farligaste-lista-vad-du-behover-veta\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T21:49:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T21:49:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"966\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"wordCount\":757,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"name\":\"CISA Adds Three New Vulnerabilities to Their \\\"Most Dangerous\\\" List: What You Need to Know | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"width\":966,\"height\":425,\"caption\":\"CISA Adds Three New Vulnerabilities to Their Most Dangerous List\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA l\u00e4gger till tre nya s\u00e5rbarheter till sin \"Mest Farliga\"-lista: Vad du beh\u00f6ver veta | S\u00e4kerhetsgenomg\u00e5ng","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/nyheter\/cisa-lagger-till-tre-nya-sarbarheter-pa-sin-farligaste-lista-vad-du-behover-veta\/","og_locale":"sv_SE","og_type":"article","og_title":"CISA Adds Three New Vulnerabilities to Their \"Most Dangerous\" List: What You Need to Know | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Forts\u00e4tt l\u00e4sa CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","og_url":"https:\/\/securitybriefing.net\/sv\/nyheter\/cisa-lagger-till-tre-nya-sarbarheter-pa-sin-farligaste-lista-vad-du-behover-veta\/","og_site_name":"Security Briefing","article_published_time":"2025-03-19T21:49:44+00:00","article_modified_time":"2025-03-19T21:49:48+00:00","og_image":[{"width":966,"height":425,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"C\u00e9sar Daniel Barreto","Ber\u00e4knad l\u00e4stid":"5 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"wordCount":757,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","articleSection":["News"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","name":"CISA l\u00e4gger till tre nya s\u00e5rbarheter till sin \"Mest Farliga\"-lista: Vad du beh\u00f6ver veta | S\u00e4kerhetsgenomg\u00e5ng","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","width":966,"height":425,"caption":"CISA Adds Three New Vulnerabilities to Their Most Dangerous List"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar Daniel Barreto","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u00e4r en uppskattad cybers\u00e4kerhetsskribent och expert, k\u00e4nd f\u00f6r sin djupg\u00e5ende kunskap och f\u00f6rm\u00e5ga att f\u00f6renkla komplexa cybers\u00e4kerhets\u00e4mnen. Han har l\u00e5ng erfarenhet av n\u00e4tverkss\u00e4kerhet och dataskydd och bidrar regelbundet med insiktsfulla artiklar och analyser om de senaste trenderna inom cybers\u00e4kerhet, som utbildar b\u00e5de yrkesverksamma och allm\u00e4nheten.","url":"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/3572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=3572"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/3572\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/3573"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=3572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=3572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=3572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}