CISA’s New Cyber Alarms: Two Exploits Added to Vulnerability Catalog!

CISA has updated its Known Exploited Vulnerabilities Catalog with two new risks: CVE-2025-11371, which lets files party like it’s 1999, and CVE-2025-48703, where OS commands run wild. These vulnerabilities are like the uninvited guests at a cyber party, posing significant threats to the federal enterprise.

Pro Dashboard

Hot Take:

Well, it seems the cyber boogeymen have found new costumes to wear this Halloween! CISA’s adding two new vulnerabilities to their KEV Catalog. It’s like a VIP guest list for exploits that no one wants crashing their party. While Gladinet CentreStack and Triofox are busy playing peek-a-boo with your files, the CWP Control Web Panel is channeling its inner magician, pulling off OS command injections out of thin air. Better lock your digital doors, folks, because these vulnerabilities are the uninvited guests that just love a good federal enterprise bash!

Key Points:

  • CISA has identified two new vulnerabilities actively exploited by cyber villains.
  • Vulnerabilities: Gladinet CentreStack/Triofox and CWP Control Web Panel.
  • These vulnerabilities can be a gateway for cyberattacks on the federal enterprise.
  • Binding Operational Directive (BOD) 22-01 mandates mitigation of these exploits.
  • FCEB agencies are required to patch these vulnerabilities promptly.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?