Article Details

Scrape Timestamp (UTC): 2025-08-26 06:01:15.941

Source: https://thehackernews.com/2025/08/cisa-adds-three-exploited.html

Original Article Text

Click to Toggle View

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws impacting Citrix Session Recording and Git to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows - Both the Citrix flaws were patched by the company in November 2024 following responsible disclosure by watchTowr Labs on July 14, 2024. CVE-2025-48384, on the other hand, was addressed by the Git project earlier this July. A proof-of-concept (PoC) exploit was released by Datadog following public disclosure. "If a submodule path contains a trailing CR, the altered path can cause Git to initialize the submodule in an unintended location," Arctic Wolf said about CVE-2025-48384. "When this is combined with a symlink pointing to the submodule hooks directory and an executable post-checkout hook, cloning a repository can result in unintended code execution." As is typically the case, CISA has provided no further technical details on the exploitation activity, or who may be behind them. Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary mitigations by September 15, 2025, to secure their networks against active threats.

Daily Brief Summary

VULNERABILITIES // CISA Adds Citrix and Git Vulnerabilities to Exploited Catalog

CISA has identified three new vulnerabilities affecting Citrix Session Recording and Git, adding them to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.

Citrix addressed the security flaws in November 2024 after a responsible disclosure by watchTowr Labs in July 2024, ensuring timely mitigation.

The Git vulnerability, CVE-2025-48384, was patched in July 2024; a proof-of-concept exploit was subsequently released by Datadog, raising awareness of potential risks.

CVE-2025-48384 involves a submodule path issue that could lead to unintended code execution when combined with specific symlink and hook configurations.

Federal Civilian Executive Branch agencies have been mandated to implement necessary mitigations by September 15, 2025, to protect their networks from these vulnerabilities.

The inclusion in the KEV catalog signals the critical nature of these vulnerabilities and the need for immediate action to prevent exploitation.