CISA Expands Known Exploited Vulnerabilities Catalog with New Entries (CVE-2023-48788, CVE-2021-44529 and CVE-2019-7256)

Bar Refael

March 27, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the inclusion of three new vulnerabilities into its Known Exploited Vulnerabilities Catalog. This update comes as a direct response to verified instances of active exploitation in the wild. The affected products include Fortinet’s FortiClient EMS, Ivanti’s Endpoint Manager Cloud Service Appliance (EPM CSA), and the Nice Linear eMerge E3-Series. These vulnerabilities have been identified as critical attack vectors leveraged by cyber adversaries, underscoring a heightened risk landscape for federal entities and beyond.

Vulnerability Details:

CVE-2023-48788 – Fortinet FortiClient EMS SQL Injection Vulnerability

  • Description: This vulnerability allows remote attackers to execute arbitrary SQL commands through the FortiClient EMS interface, potentially compromising the underlying database.
  • Impact: High – SQL injection vulnerabilities can lead to data breaches, unauthorized access to sensitive information, and system compromise.
  • Remediation: Users are advised to apply the latest patches provided by Fortinet immediately.
  • CVE-2021-44529 – Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection Vulnerability
    • Description: This flaw permits remote code execution within the context of the cloud service appliance, allowing attackers to inject and execute malicious code.
    • Impact: Critical – Code injection vulnerabilities enable attackers to gain control over affected systems, leading to data theft, system disruption, and further network compromise.
    • Remediation: Ivanti has released updates to mitigate this vulnerability. Affected organizations should ensure the deployment of these updates without delay.
  • CVE-2019-7256 – Nice Linear eMerge E3-Series OS Command Injection Vulnerability
    • Description: The vulnerability is an OS command injection flaw that could allow authenticated users to execute arbitrary commands on the system.
    • Impact: Severe – Exploitation of this vulnerability could result in complete system takeover, data manipulation, and the introduction of additional malicious activity.
    • Remediation: Users should install the latest firmware updates provided by Nice Linear for the eMerge E3-Series.

Advisory Context:

The inclusion of these vulnerabilities in CISA’s catalog follows the Binding Operational Directive (BOD) 22-01, aimed at mitigating significant cybersecurity threats within the Federal Civilian Executive Branch (FCEB). While the directive specifically targets FCEB agencies, CISA emphasizes the universal threat these vulnerabilities pose, strongly recommending that all organizations prioritize their remediation efforts to bolster their cyber defense postures.


  • Patch Management: Promptly apply available patches for the impacted products to mitigate the risk of exploitation.
  • Vulnerability Scanning: Regularly perform vulnerability scans to detect and address potential weaknesses before they can be exploited.
  • Security Awareness: Educate staff about the risks associated with these vulnerabilities and encourage vigilance in detecting potential phishing attempts or suspicious activities.
  • Incident Response Plan: Ensure that an up-to-date incident response plan is in place, enabling swift action in the event of a suspected compromise.


The active exploitation of these vulnerabilities represents a significant risk to organizations globally. By adhering to CISA’s recommendations and implementing comprehensive security measures, entities can significantly reduce their exposure to these and future vulnerabilities.

Stay Secure. Stay Informed.

OP Innovate Research Team.

Under Cyber Attack?

Fill out the form and we will contact you immediately.

Get OP Innovate CTI Alerts

Leave your email and get critical updates and alerts straight to your inbox