CMS Hybrid Cloud Launches the 2025 Q4 CMS Enterprise Security Campaign
CMS Hybrid Cloud Logo

Summary

Starting December 8th, 2025, the CMS Hybrid Cloud Team will begin the Q4 2025 CMS Enterprise Security Campaign.

Any findings will be tracked via Jira tickets and assigned to the respective teams to remediate risks. The Q4 CMS Enterprise Security Campaign is targeting a list of vulnerabilities and Common Vulnerabilities and Exposures (CVEs) that pose a high risk to CMS systems.

On December 19th, 2025, new GuardRails will be added to all Non-Marketplace accounts to prevent the reintroduction of certain findings back into the CMS environment.

Benefits

Resolving findings in customers' Jira tickets ensures CMS systems remain secure. Participating in proactive, routine security activities, such as this CMS Enterprise Security Campaign, reduces the risk of unauthorized and/or malicious activity.

The CMS Enterprise Security Campaign will target and identify the following vulnerabilities and CVEs:

Targeted Vulnerabilities and Common Vulnerabilities and Exposures (CVEs)

CVE ID Tenable Plugin ID Plugin Description Severity
N/A 56212 Adobe Acrobat Unsupported Version Detection Critical
N/A 172178 ASP.NET Core SEoL Critical
CVE-2024-32002 202262 Git for Windows < 2.45.1 Multiple Vulnerabilities Critical
N/A 216754 Google Chrome < 133.0.6943.141 Vulnerability Critical
CVE-2025-62215 274789 KB5068787: Windows Server 2022 / Azure Stack HCI 22H2 Security Update (November 2025) Critical
CVE-2025-62215 274782 KB5068791: Windows 10 version 1809 / Windows Server 2019 Security Update (November 2025) Critical
CVE-2025-60724 274780 KB5068864: Windows 10 Version 1607 / Windows Server 2016 Security Update (November 2025) Critical
CVE-2025-13027 274834 Mozilla Firefox < 145.0 Critical
N/A 55958 Oracle Java JRE Unsupported Version Detection Critical
N/A 148367 Python Unsupported Version Detection Critical
CVE-2025-6965 274798 RHEL 9 : sqlite (RHSA-2025:20936) Critical
CVE-2025-43343 274761 RHEL 9 : webkit2gtk3 (RHSA-2025:20922) Critical

Note:

Operating System (OS)-level findings are remediated by the CMS Hybrid Cloud Team for customers who receive regular CMS Gold Image patching services. Please note that CMS customers are responsible for patching any software installed on top of the provided CMS Gold Image.

  • For all Non-Marketplace accounts, CMS Hybrid Cloud will deploy auto-remediation for the following Security Hub controls:
    • GuardRails / auto-remediations (Security Hub controls):
      • EC2.15- Amazon EC2 subnets should not automatically assign public IP addresses.
    • CMS customer teams with existing findings for these Security Hub controls will receive a Jira ticket.
      • Teams will either need to resolve the finding or obtain an exemption.

Expected Actions

  • CMS customer teams with findings will receive a Jira ticket.
    • If you would like to obtain an exemption, you will need to complete an attestation.
  • CMS customers should resolve all received Jira tickets as soon as possible.
    • For help, please refer to the "Questions or Concerns" section below for instructions on how to submit a Hybrid Cloud Support Ticket.
  • Failure to resolve findings can lead to compromised systems that result in greater risks for unauthorized and/or malicious activity.
  • Unresolved system flaws will result in Plan of Action and Milestones (POA&Ms) being issued against the Federal Information Security Modernization Act (FISMA) boundary.

Timeline

  • December 8th, 2025: CMS customers with findings will receive Jira tickets for the finding noted in the "Benefits" section above.
  • December 19th, 2025: CMS Hybrid Cloud will add new GuardRails to all Non-Marketplace accounts to protect CMS systems from reintroducing findings back into the environment.

Additional Information

Questions or Concerns

We look forward to helping you and your team. Reach out to your IUSG Hosting Coordinator with any questions. For further help, please fill out a Hybrid Cloud Support ticket specifying Service as "Security Hub" and Request as "Security Hub Findings".

 


This email was sent to NPxrji73qy@niepodam.pl using GovDelivery Communications Cloud 7500 Security Boulevard · Baltimore MD 21244