News from cisa.gov
We’ve assigned a rating of Unknown factuality to cisa.gov. You can read more about how we’ve determined cisa.gov’s credibility and reliability as a news source here: https://ground.news/rating-system.
Media Bias Ratings
Do you disagree?
Edit bias
Learn more about Media Bias Ratings.
Factuality
Learn more about Factuality Ratings
Reveal Factuality Ratings by upgrading to a Premium account.
Tap Upgrade to explore subscription options to meet all your reading needs.
Ownership
Learn more about Ownership categories
Reveal Ownership Data by upgrading to a Vantage account.
Tap Upgrade to explore subscription options to meet all your reading needs.
Top cisa.gov News

Microsoft · United StatesCISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
CVE-2022-48503 Apple Multiple Products Unspecified Vulnerability
CVE-2025-2746 Kentico Xperience Staging Sync Server Digest Password Authentication Bypass Vulnerability
CVE-2025-2747 Kentico Xperience Staging Sync Server None Password Type Authentication Bypass Vulnerability
CVE-2025-33073 Microsoft Windows…See the Story
CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA · United StatesView CSAF 1. EXECUTIVE SUMMARY
CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: Compact GuardLogix 5370 Vulnerability: Uncaught Exception 2. RISK EVALUATION Successful exploitation of this vulnerability could result in a denial-of-service. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Compact GuardLogix 5370 are affected:
Compact GuardLogix 5370: All versions prior …See the Story
Rockwell Automation Compact GuardLogix 5370

Oxford, England · OxfordView CSAF 1. EXECUTIVE SUMMARY
CVSS v4 8.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Oxford Nanopore Technologies Equipment: MinKNOW Vulnerabilities: Missing Authentication for Critical Function, Insufficiently Protected Credentials, Improper Check for Unusual or Exceptional Conditions 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to disrupt sequencing operations and processes, e…See the Story