{"id":44926,"date":"2022-01-21T18:37:00","date_gmt":"2022-01-21T18:37:00","guid":{"rendered":"http:\/\/f85be747-7607-4412-ba20-3e9cf29764b8"},"modified":"2022-01-21T18:37:00","modified_gmt":"2022-01-21T18:37:00","slug":"cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/","title":{"rendered":"CISA adds 13 exploited vulnerabilities to list, 9 with Feb. 1 remediation date"},"content":{"rendered":"<p>CISA released its <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/01\/18\/cisa-adds-13-known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">latest update<\/a> to the <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Known Exploited Vulnerabilities catalog<\/a>, adding 13 new vulnerabilities. Nine of the vulnerabilities have a remediation date of February 1 and four of them have a remediation date of July 18.&nbsp;<\/p>\n<p>The list includes an October CMS Improper Authentication, a System Information Library for node.js Command Injection vulnerability, an Oracle Corporate Business Intelligence Enterprise Edition Path Traversal vulnerability, an Apache Airflow Experimental API Authentication Bypass vulnerability, a Drupal Core Unrestricted Upload of File vulnerability, and three Nagios XI OS Command Injection vulnerabilities.<\/p>\n<figure class=\"image image-large shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/\" class=\"lazy\" alt=\"screen-shot-2022-01-21-at-1-33-28-pm.png\" height=\"auto\" width=\"470\" data-original=\"https:\/\/www.zdnet.com\/a\/img\/resize\/05ad6f49a830462a266107390fa36cf4f8258f79\/2022\/01\/21\/1ec6126b-dab9-4fff-9fdf-b93c2405e07f\/screen-shot-2022-01-21-at-1-33-28-pm.png?width=470&amp;fit=bounds&amp;auto=webp\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/05ad6f49a830462a266107390fa36cf4f8258f79\/2022\/01\/21\/1ec6126b-dab9-4fff-9fdf-b93c2405e07f\/screen-shot-2022-01-21-at-1-33-28-pm.png?width=470&amp;fit=bounds&amp;auto=webp\" class alt=\"screen-shot-2022-01-21-at-1-33-28-pm.png\" height=\"auto\" width=\"470\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> CISA <\/span><\/figcaption><\/figure>\n<p>The October CMS Improper Authentication &#8212; CVE-2021-32648 &#8212; <a href=\"https:\/\/cert.gov.ua\/article\/17899\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">was allegedly used<\/a> during a <a href=\"https:\/\/www.zdnet.com\/article\/ukraine-says-70-state-websites-were-defaced-10-were-subjected-to-unauthorized-interference\/\" target=\"_blank\" rel=\"noopener\">cyberattack on Ukrainian government systems<\/a> last week. A patch was <a href=\"https:\/\/www.cvedetails.com\/cve\/CVE-2021-32648\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">released<\/a> in September 2021.&nbsp;<\/p>\n<p>The Media Trust CEO Chris Olson said the vulnerability&#8217;s alleged use in <a href=\"https:\/\/www.zdnet.com\/article\/a-massive-hacking-attack-has-hit-government-websites-in-ukraine\/\" target=\"_blank\" rel=\"noopener\">the recent attack on Ukraine<\/a> explains the software&#8217;s inclusion on the list but he noted that its inclusion highlights &#8220;an alarming growth in web-based cyberattacks and the role they will play in global cyber warfare.&#8221;&nbsp;<\/p>\n<p>&#8220;Little attention is paid to the Web as an attack surface. While organizations across the public and private sector are increasingly aware of cyber risk, the stack of third-party code used in Web development rarely meets the standards for AppSec that those organizations would demand from any of their IT systems,&#8221; Olson said.&nbsp;<\/p>\n<p>Jordan LaRose, director of incident response at F-Secure, told ZDNet that CISA&#8217;s guidance matches much of what they are seeing in the wild from a malicious actor standpoint.&nbsp;<\/p>\n<p>LaRose said that what stood out most to him was that these are all vulnerabilities affecting web servers or APIs. This is a trend LaRose said he has seen develop significantly in the past year among malicious actors, many of whom are turning to more than just classical methods like phishing or trojans to gain footholds in organizations with strong security postures.&nbsp;<\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>&#8220;What we&#8217;re seeing now is a wave of attacks where attackers are targeting technology rather than people, with the most recent notable example being the Log4Shell attacks. These attacks are largely done opportunistically, with attackers loading up scanning scripts with the exploits and hitting everything they can on the internet to find a potential victim,&#8221; he said.&nbsp;<\/p>\n<p>Neosec vice president Edward Roberts echoed that sentiment, adding that the volume of vulnerabilities involving APIs will continue to increase because there are more APIs being developed each day. Most organizations, he said, &#8220;don&#8217;t even know how many APIs they have, let alone which ones have vulnerabilities, let alone consider how they are being defrauded by abusive behavior.&#8221;<\/p>\n<p>A number of cybersecurity experts noted that several of these vulnerabilities were identified months ago. Some of the vulnerabilities on the list date back to 2012 and 2013 according to Netenrich principal threat hunter John Bambenek, who expressed concerns about the fact that they haven&#8217;t already been patched. &nbsp;<\/p>\n<p>&#8220;That the agency doesn&#8217;t have basic patch deployment information from other units of government implies there is no central management of that information. The posture of federal IT cybersecurity seems to have remained stalled at square one,&#8221; Bambenek said.&nbsp;<\/p>\n<p>&#8220;If an exploited vulnerability can be used to execute commands on the victim machine, then CISA sets a two week due date to patch. That being said, two weeks is far too slow. The exchange vulnerability concerns me the most, however, some of this stuff is quite off the beaten path. But, this may be common in government installations so worthy to put on the list.&#8221;<\/p>\n<p>Vulcan Cyber CPO Tal Morgenstern noted that seven of the vulnerabilities with remediation dates of February 1 relate to systems management tools.<\/p>\n<p>&#8220;Systems management tools from VMware, Nagios, F5, Npm and more hold the keys to the kingdom giving the user substantial power to automate system change for good or bad. This isn&#8217;t a new concern as we&#8217;ve seen an unfortunate trend of vulnerabilities in systems management software tools this year,&#8221; Morgenstern explained.&nbsp;<\/p>\n<p>&#8220;Considering the amount of access and control these tools have, IT security teams must take immediate steps to fully mitigate known risks. Don&#8217;t wait for February. Move now.&#8221;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CISA urged federal civilian agencies to address 9 vulnerabilities within the next two weeks.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-44926","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA adds 13 exploited vulnerabilities to list, 9 with Feb. 1 remediation date 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA adds 13 exploited vulnerabilities to list, 9 with Feb. 1 remediation date 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-21T18:37:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"CISA adds 13 exploited vulnerabilities to list, 9 with Feb. 1 remediation date\",\"datePublished\":\"2022-01-21T18:37:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/\"},\"wordCount\":704,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/\",\"name\":\"CISA adds 13 exploited vulnerabilities to list, 9 with Feb. 1 remediation date 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/\",\"datePublished\":\"2022-01-21T18:37:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA adds 13 exploited vulnerabilities to list, 9 with Feb. 1 remediation date\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA adds 13 exploited vulnerabilities to list, 9 with Feb. 1 remediation date 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/","og_locale":"en_US","og_type":"article","og_title":"CISA adds 13 exploited vulnerabilities to list, 9 with Feb. 1 remediation date 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-01-21T18:37:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"CISA adds 13 exploited vulnerabilities to list, 9 with Feb. 1 remediation date","datePublished":"2022-01-21T18:37:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/"},"wordCount":704,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/","url":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/","name":"CISA adds 13 exploited vulnerabilities to list, 9 with Feb. 1 remediation date 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/","datePublished":"2022-01-21T18:37:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/","contentUrl":"https:\/\/www.zdnet.com\/article\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cisa-adds-13-exploited-vulnerabilities-to-list-9-with-feb-1-remediation-date\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"CISA adds 13 exploited vulnerabilities to list, 9 with Feb. 1 remediation date"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44926"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44926\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}