<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="https://www.cisa.gov/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Alerts</title>
    <link>https://www.cisa.gov/</link>
    <description></description>
    <language>en</language>
    
    <item>
  <title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/14/cisa-adds-two-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added two new vulnerabilities to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2009-0238&quot; target=&quot;_blank&quot;&gt;CVE-2009-0238&lt;/a&gt; Microsoft Office Remote Code Execution Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-32201&quot; target=&quot;_blank&quot;&gt;CVE-2026-32201&lt;/a&gt; Microsoft SharePoint Server Improper Input Validation Vulnerability&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet &lt;/a&gt;for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Tue, 14 Apr 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24730</guid>
    </item>
<item>
  <title>CISA Adds Seven Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/13/cisa-adds-seven-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added seven new vulnerabilities to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2012-1854&quot; target=&quot;_blank&quot;&gt;CVE-2012-1854&lt;/a&gt; Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2020-9715&quot; target=&quot;_blank&quot;&gt;CVE-2020-9715&lt;/a&gt; Adobe Acrobat Use-After-Free Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2023-21529&quot; target=&quot;_blank&quot;&gt;CVE-2023-21529&lt;/a&gt; Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2023-36424&quot; target=&quot;_blank&quot;&gt;CVE-2023-36424&lt;/a&gt; Microsoft Windows Out-of-Bounds Read Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-60710&quot; target=&quot;_blank&quot;&gt;CVE-2025-60710&lt;/a&gt; Microsoft Windows Link Following Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-21643&quot; target=&quot;_blank&quot;&gt;CVE-2026-21643&lt;/a&gt; Fortinet SQL Injection Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-34621&quot; target=&quot;_blank&quot;&gt;CVE-2026-34621&lt;/a&gt; Adobe Acrobat and Reader Prototype Pollution Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Mon, 13 Apr 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24718</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/08/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-1340&quot; target=&quot;_blank&quot;&gt;CVE-2026-1340&lt;/a&gt; Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Wed, 08 Apr 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24714</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-35616&quot; target=&quot;_blank&quot;&gt;CVE-2026-35616&lt;/a&gt; - Fortinet FortiClient EMS Improper Access Control Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Mon, 06 Apr 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24710</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/02/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added&amp;nbsp;one&amp;nbsp;new&amp;nbsp;vulnerability&amp;nbsp;to its&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-3502&quot; target=&quot;_blank&quot;&gt;CVE-2026-3502&lt;/a&gt;&amp;nbsp;TrueConf&amp;nbsp;Client Download of Code Without Integrity Check Vulnerability&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt;&amp;nbsp;established the KEV&amp;nbsp;Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt;&amp;nbsp;for more information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing&amp;nbsp;timely&amp;nbsp;remediation of&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt;&amp;nbsp;as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Thu, 02 Apr 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24703</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/01/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its&lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt; Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-5281&quot; target=&quot;_blank&quot;&gt;CVE-2026-5281&lt;/a&gt; Google Dawn Use-After-Free Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Wed, 01 Apr 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24701</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/30/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-3055&quot; target=&quot;_blank&quot;&gt;CVE-2026-3055&lt;/a&gt; Citrix NetScaler Out-of-Bounds Read Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Mon, 30 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24697</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-53521&quot; target=&quot;_blank&quot;&gt;CVE-2025-53521&lt;/a&gt; F5 BIG-IP Remote Code Execution Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Fri, 27 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24696</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/26/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-33634&quot; target=&quot;_blank&quot;&gt;CVE-2026-33634&lt;/a&gt; Aqua Security Trivy Embedded Malicious Code Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Thu, 26 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24687</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/25/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-33017&quot; target=&quot;_blank&quot;&gt;CVE-2026-33017&lt;/a&gt; Langflow Code Injection Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Wed, 25 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24686</guid>
    </item>
<item>
  <title>CISA Adds Five Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/20/cisa-adds-five-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added five new vulnerabilities to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-31277&quot; target=&quot;_blank&quot;&gt;CVE-2025-31277&lt;/a&gt; Apple Multiple Products Buffer Overflow Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-32432&quot; target=&quot;_blank&quot;&gt;CVE-2025-32432&lt;/a&gt; Craft CMS Code Injection Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-43510&quot; target=&quot;_blank&quot;&gt;CVE-2025-43510&lt;/a&gt; Apple Multiple Products Improper Locking Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-43520&quot; target=&quot;_blank&quot;&gt;CVE-2025-43520&lt;/a&gt; Apple Multiple Products Classic Buffer Overflow Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-54068&quot; target=&quot;_blank&quot;&gt;CVE-2025-54068&lt;/a&gt; Laravel Livewire Code Injection Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Fri, 20 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24675</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/19/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-20131&quot; target=&quot;_blank&quot;&gt;CVE-2026-20131&lt;/a&gt; Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Thu, 19 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24665</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-adds-one-known-exploited-vulnerability-catalog-0</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-20963&quot; target=&quot;_blank&quot;&gt;CVE-2026-20963&lt;/a&gt; Microsoft SharePoint Deserialization of Untrusted Data Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Wed, 18 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24663</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-66376&quot; target=&quot;_blank&quot;&gt;CVE-2025-66376&lt;/a&gt; Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&lt;/p&gt;
</description>
  <pubDate>Wed, 18 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24660</guid>
    </item>
<item>
  <title>CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-urges-endpoint-management-system-hardening-after-cyberattack-against-us-organization</link>
  <description>&lt;p&gt;CISA is aware of malicious cyber activity targeting endpoint management systems of U.S. organizations based on the March 11, 2026 cyberattack against U.S.-based medical technology firm Stryker Corporation, which affected their Microsoft environment.&lt;a href=&quot;#note1&quot;&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt; To defend against similar malicious cyber activity, CISA urges organizations to harden endpoint management system configurations using the recommendations and resources provided in this alert. CISA is conducting enhanced coordination with federal partners, including the Federal Bureau of Investigation (FBI), to identify additional threats and determine mitigation actions.&lt;/p&gt;
&lt;p&gt;To defend against similar malicious activity that misuses legitimate endpoint management software, CISA urges organizations to implement Microsoft’s newly released &lt;a href=&quot;https://techcommunity.microsoft.com/blog/intunecustomersuccess/best-practices-for-securing-microsoft-intune/4502117&quot; target=&quot;_blank&quot;&gt;best practices for securing Microsoft Intune&lt;/a&gt;; the principles of these recommendations can be applied to Intune and more broadly to other endpoint management software:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Use principles of least privilege when designing administrative roles&lt;/strong&gt;.
&lt;ul&gt;
&lt;li&gt;Leverage Microsoft Intune’s role-based access control (RBAC) to assign the minimum permissions necessary to each role for completing day-to-day operations—permissions include what actions the role can take, and what users and devices it can apply that action to.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enforce phishing-resistant multi-factor authentication (MFA) and privileged access hygiene&lt;/strong&gt;.
&lt;ul&gt;
&lt;li&gt;Use Microsoft Entra ID capabilities (including Conditional Access, MFA, risk signals, and privileged access controls) to block unauthorized access to privileged actions in Microsoft Intune.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure access policies to require &lt;/strong&gt;&lt;a href=&quot;https://learn.microsoft.com/en-us/intune/intune-service/fundamentals/multi-admin-approval&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;Multi Admin Approval in Microsoft Intune&lt;/strong&gt;&lt;/a&gt;.
&lt;ul&gt;
&lt;li&gt;Set up policies that require a second administrative account’s approval to allow changes to sensitive or high-impact actions (such as device wiping), applications, scripts, RBAC, configurations, etc. &amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Additionally, CISA recommends reviewing the following resources to strengthen defenses against similar malicious cyber activity:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Microsoft resources:
&lt;ul&gt;
&lt;li&gt;For recommendations on securing Microsoft Intune, see &lt;a href=&quot;https://techcommunity.microsoft.com/blog/intunecustomersuccess/best-practices-for-securing-microsoft-intune/4502117&quot; target=&quot;_blank&quot;&gt;Best practices for securing Microsoft Intune&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For guidance on implementing Multi Admin Approval in Microsoft Intune, see &lt;a href=&quot;https://learn.microsoft.com/en-us/intune/intune-service/fundamentals/multi-admin-approval&quot; target=&quot;_blank&quot;&gt;Use Access policies to implement Multi Admin Approval&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For recommendations on configuring Microsoft Intune using zero trust principles, see &lt;a href=&quot;https://learn.microsoft.com/en-us/intune/intune-service/protect/zero-trust-configure-security?toc=/security/zero-trust/assessment/toc.json&amp;amp;bc=/security/zero-trust/assessment/toc.json&quot; target=&quot;_blank&quot;&gt;Configure Microsoft Intune for increased security&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For guidance on implementing Microsoft Intune RBAC policies, see &lt;a href=&quot;https://learn.microsoft.com/en-us/intune/intune-service/fundamentals/role-based-access-control&quot; target=&quot;_blank&quot;&gt;Role-based access control (RBAC) with Microsoft Intune&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For guidance on deploying Privileged Identity Management (PIM) across Microsoft Intune, Entra ID, and other Microsoft software, see &lt;a href=&quot;https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-deployment-plan&quot; target=&quot;_blank&quot;&gt;Plan a Privileged Identity Management deployment&lt;/a&gt;. &amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;CISA resources:
&lt;ul&gt;
&lt;li&gt;For guidance on implementing phishing-resistant multifactor authentication (MFA), see &lt;a href=&quot;https://www.cisa.gov/sites/default/files/2023-01/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf&quot;&gt;Implementing Phishing-Resistant MFA&lt;/a&gt;.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA. &amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Acknowledgements&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;Microsoft and Stryker contributed to this alert.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Notes &lt;/strong&gt;&lt;a class=&quot;ck-anchor&quot; id=&quot;note1&quot;&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;1 For updates from Stryker on the incident, see “Customer Updates: Stryker Network Disruption,” Stryker, last modified March 15, 2026, &lt;a href=&quot;https://www.stryker.com/us/en/about/news/2026/a-message-to-our-customers-03-2026.html&quot; target=&quot;_blank&quot;&gt;https://www.stryker.com/us/en/about/news/2026/a-message-to-our-customers-03-2026.html&lt;/a&gt;.&lt;/p&gt;
</description>
  <pubDate>Wed, 18 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24653</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/16/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;div class=&quot;OutlineElement Ltr SCXW244767289 BCX8&quot;&gt;
&lt;p&gt;CISA has added one new vulnerability to its &lt;a class=&quot;Hyperlink SCXW244767289 BCX8&quot; href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot; rel=&quot;noreferrer noopener&quot;&gt;&lt;u&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/u&gt;&lt;/a&gt;, based on evidence of active exploitation.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ListContainerWrapper SCXW244767289 BCX8&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-47813&quot; target=&quot;_blank&quot;&gt;&lt;u&gt;CVE-2025-47813&lt;/u&gt;&lt;/a&gt; Wing FTP Server Information Disclosure Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;&lt;u&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/u&gt;&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;&lt;u&gt;BOD 22-01 Fact Sheet&lt;/u&gt;&lt;/a&gt; for more information.&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;OutlineElement Ltr SCXW244767289 BCX8&quot;&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;&lt;u&gt;KEV Catalog vulnerabilities&lt;/u&gt;&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities&quot;&gt;&lt;u&gt;specified criteria&lt;/u&gt;&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
</description>
  <pubDate>Mon, 16 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24651</guid>
    </item>
<item>
  <title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/13/cisa-adds-two-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added two new vulnerabilities to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-3909&quot; target=&quot;_blank&quot;&gt;CVE-2026-3909&lt;/a&gt; Google Skia Out-of-Bounds Write Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-3910&quot; target=&quot;_blank&quot;&gt;CVE-2026-3910&lt;/a&gt; Google Chromium V8 Unspecified Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Fri, 13 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24645</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/11/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-68613&quot; target=&quot;_blank&quot;&gt;CVE-2025-68613&lt;/a&gt; n8n Improper Control of Dynamically-Managed Code Resources Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&lt;br&gt;&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Wed, 11 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24636</guid>
    </item>
<item>
  <title>CISA Adds Three Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/09/cisa-adds-three-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added three new vulnerabilities to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2021-22054&quot; target=&quot;_blank&quot;&gt;CVE-2021-22054&lt;/a&gt; Omnissa Workspace ONE Server-Side Request Forgery&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-26399&quot; target=&quot;_blank&quot;&gt;CVE-2025-26399&lt;/a&gt; SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-1603&quot; target=&quot;_blank&quot;&gt;CVE-2026-1603&lt;/a&gt; Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&lt;/p&gt;
</description>
  <pubDate>Mon, 09 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24626</guid>
    </item>
<item>
  <title>CISA Adds Five Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/05/cisa-adds-five-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added five new vulnerabilities to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2017-7921&quot; target=&quot;_blank&quot;&gt;CVE-2017-7921&lt;/a&gt; Hikvision Multiple Products Improper Authentication Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2021-22681&quot; target=&quot;_blank&quot;&gt;CVE-2021-22681&lt;/a&gt; Rockwell Multiple Products Insufficient Protected Credentials Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2021-30952&quot; target=&quot;_blank&quot;&gt;CVE-2021-30952&lt;/a&gt; Apple Multiple Products Integer Overflow or Wraparound Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2023-41974&quot; target=&quot;_blank&quot;&gt;CVE-2023-41974&lt;/a&gt; Apple iOS and iPadOS Use-After-Free Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2023-43000&quot; target=&quot;_blank&quot;&gt;CVE-2023-43000&lt;/a&gt; Apple Multiple products Use-After-Free Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog&lt;/a&gt; vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&lt;/p&gt;
</description>
  <pubDate>Thu, 05 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24625</guid>
    </item>
<item>
  <title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/03/cisa-adds-two-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added two new vulnerabilities to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-21385&quot; target=&quot;_blank&quot;&gt;CVE-2026-21385&lt;/a&gt; Qualcomm Multiple Chipsets Memory Corruption Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-22719&quot; target=&quot;_blank&quot;&gt;CVE-2026-22719&lt;/a&gt; Broadcom VMware Aria Operations Command Injection Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&lt;/p&gt;
</description>
  <pubDate>Tue, 03 Mar 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24618</guid>
    </item>
<item>
  <title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/25/cisa-adds-two-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added&amp;nbsp;two&amp;nbsp;new&amp;nbsp;vulnerabilities&amp;nbsp;to its&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2022-20775&quot; target=&quot;_blank&quot;&gt;CVE-2022-20775&lt;/a&gt;&amp;nbsp;Cisco&amp;nbsp;Catalyst&amp;nbsp;SD-WAN Path Traversal Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-20127&quot; target=&quot;_blank&quot;&gt;CVE-2026-20127&lt;/a&gt;&amp;nbsp;Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These&amp;nbsp;types&amp;nbsp;of vulnerabilities&amp;nbsp;are&amp;nbsp;frequent attack vectors&amp;nbsp;for malicious cyber actors and pose&amp;nbsp;significant risks to the federal enterprise.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt;&amp;nbsp;established the KEV&amp;nbsp;Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt;&amp;nbsp;for more information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing&amp;nbsp;timely&amp;nbsp;remediation of&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt;&amp;nbsp;as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&lt;/p&gt;
</description>
  <pubDate>Wed, 25 Feb 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24595</guid>
    </item>
<item>
  <title>CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/25/cisa-and-partners-release-guidance-ongoing-global-exploitation-cisco-sd-wan-systems</link>
  <description>&lt;p&gt;&lt;em&gt;The purpose of this Alert is to provide resources for organizations with Cisco Software-Defined Wide-Area Networking (SD-WAN) systems, including Federal Civilian Executive Branch (FCEB) agencies, to address ongoing exploitation of multiple vulnerabilities. Notably, the Cybersecurity and Infrastructure Security Agency (CISA) has added&amp;nbsp;&lt;/em&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-20127&quot; target=&quot;_blank&quot;&gt;&lt;em&gt;CVE-2026-20127&lt;/em&gt;&lt;/a&gt;&lt;em&gt; and&amp;nbsp;&lt;/em&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2022-20775&quot; target=&quot;_blank&quot;&gt;&lt;em&gt;CVE-2022-20775&lt;/em&gt;&lt;/a&gt;&lt;em&gt; to its Known Exploited Vulnerabilities (KEV) Catalog on Feb. 25, 2026. As a result of the malicious cyber activity and vulnerabilities involving Cisco SD-WAN systems, CISA has outlined requirements for FCEB agencies in Emergency Directive (ED) 26-03 to inventory Cisco SD-WAN systems, update them, and assess compromise.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;CISA and partners have observed malicious cyber actors targeting and compromising Cisco SD-WAN systems of organizations, globally. These actors have been observed exploiting a previously undisclosed authentication bypass vulnerability, CVE-2026-20127, for initial access before escalating privileges using CVE-2022-20775 and establishing long-term persistence in Cisco SD-WAN systems.&lt;/p&gt;
&lt;p&gt;CISA, National Security Agency (NSA), and international partners Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (Cyber Centre), New Zealand National Cyber Security Centre (NCSC-NZ), and United Kingdom National Cyber Security Centre (NCSC-UK), hereafter the “authoring organizations,” strongly urge network defenders to immediately 1) inventory all in-scope Cisco SD-WAN systems, 2) collect artifacts, including virtual snapshots and logs off of SD-WAN systems to support threat hunt activities, 3) fully patch Cisco SD-WAN systems with available updates, 4) hunt for evidence of compromise, and 5) concurrently review Cisco’s latest security advisories, &lt;a href=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk&quot; target=&quot;_blank&quot;&gt;Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability&lt;/a&gt; and &lt;a href=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v&quot; target=&quot;_blank&quot;&gt;Cisco Catalyst SD-WAN Vulnerabilities&lt;/a&gt;, and implement &lt;a href=&quot;https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide&quot; target=&quot;_blank&quot;&gt;Cisco’s SD-WAN Hardening Guidance&lt;/a&gt;.&lt;a href=&quot;#note1&quot;&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;To address malicious activity involving vulnerable Cisco SD-WAN systems, CISA issued &lt;a href=&quot;https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems&quot;&gt;Emergency Directive 26-03: Mitigate Vulnerabilities in Cisco SD-WAN Systems&lt;/a&gt;, which outlines requirements for FCEB agencies to inventory Cisco SD-WAN systems, update them, and assess compromise. Further, CISA released &lt;a href=&quot;https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems&quot;&gt;Supplemental Direction ED 26-03: Hunt and Hardening Guidance for Cisco SD-WAN Systems&lt;/a&gt; to provide prescriptive actions for FCEB agencies.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Cisco’s Catalyst SD-WAN Hardening Guide recommends that network defenders address:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Network perimeter controls&lt;/strong&gt;: Ensure control components are behind a firewall, isolate virtual private network (VPN) 512 interfaces, and use internet protocol (IP) blocks for manually provisioned edge IPs.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SD-WAN manager access&lt;/strong&gt;: Replace the self-signed certificate for the web user interface.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Control and data plane security&lt;/strong&gt;: Use pairwise keys.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Session timeout&lt;/strong&gt;: Limit to the shortest period possible.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Logging&lt;/strong&gt;: Forward to a remote syslog server.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;CISA and the authoring organizations are providing the following resources: &amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;CISA: &lt;a href=&quot;https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems&quot;&gt;Emergency Directive 26-03: Mitigate Vulnerabilities in Cisco SD-WAN Systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;CISA: &lt;a href=&quot;https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems&quot;&gt;Supplemental Direction ED 26-03: Hunt and Hardening Guidance for Cisco SD-WAN Systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Cisco: &lt;a href=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk&quot; target=&quot;_blank&quot;&gt;Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Cisco: &lt;a href=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v&quot; target=&quot;_blank&quot;&gt;Cisco Catalyst SD-WAN Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Cisco: &lt;a href=&quot;https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide&quot; target=&quot;_blank&quot;&gt;Cisco Catalyst SD-WAN Hardening Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;ASD’s ACSC: &lt;a href=&quot;https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf&quot; target=&quot;_blank&quot;&gt;Cisco SD-WAN Threat Hunt Guide&lt;/a&gt;, co-sealed by CISA, NSA, Cyber Centre, NCSC-NZ, and NCSC-UK. This guide, based on investigative data, supports network defenders’ detection of and response to the malicious actors’ threat activity&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;Acknowledgements&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;NSA, ASD’s ACSC, Cyber Centre, NCSC-NZ, and NCSC-UK contributed to this alert&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA. &lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Notes&lt;/strong&gt;&amp;nbsp;&lt;/h2&gt;
&lt;p&gt;&lt;a class=&quot;ck-anchor&quot; id=&quot;note1&quot;&gt;1&lt;/a&gt; Cisco Security, “Cisco Catalyst SD-WAN Hardening Guide,” last modified February 9, 2026, &lt;a href=&quot;https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide&quot; target=&quot;_blank&quot;&gt;https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide&lt;/a&gt;&lt;/p&gt;
</description>
  <pubDate>Wed, 25 Feb 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24589</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/24/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-25108&quot; target=&quot;_blank&quot;&gt;CVE-2026-25108&lt;/a&gt; Soliton Systems K.K. FileZen OS Command Injection Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&lt;/p&gt;
</description>
  <pubDate>Tue, 24 Feb 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24585</guid>
    </item>
<item>
  <title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/20/cisa-adds-two-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added two new vulnerabilities to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-49113&quot; target=&quot;_blank&quot;&gt;CVE-2025-49113&lt;/a&gt; RoundCube Webmail Deserialization of Untrusted Data Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-68461&quot; target=&quot;_blank&quot;&gt;CVE-2025-68461&lt;/a&gt; RoundCube Webmail Cross-site Scripting Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Fri, 20 Feb 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24576</guid>
    </item>
<item>
  <title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/18/cisa-adds-two-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added two new vulnerabilities to its &lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2021-22175&quot; target=&quot;_blank&quot;&gt;CVE-2021-22175&lt;/a&gt; GitLab Server-Side Request Forgery (SSRF) Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-22769&quot; target=&quot;_blank&quot;&gt;CVE-2026-22769&lt;/a&gt; Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Wed, 18 Feb 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24565</guid>
    </item>
<item>
  <title>CISA Adds Four Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/17/cisa-adds-four-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added four new vulnerabilities to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2008-0015&quot; target=&quot;_blank&quot;&gt;CVE-2008-0015&lt;/a&gt; Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2020-7796&quot; target=&quot;_blank&quot;&gt;CVE-2020-7796&lt;/a&gt; Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2024-7694&quot; target=&quot;_blank&quot;&gt;CVE-2024-7694&lt;/a&gt; TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-2441&quot; target=&quot;_blank&quot;&gt;CVE-2026-2441&lt;/a&gt; Google Chromium CSS Use-After-Free Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Tue, 17 Feb 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24554</guid>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/13/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-1731&quot; target=&quot;_blank&quot; title=&quot;https://www.cve.org/cverecord?id=cve-2026-1731&quot;&gt;CVE-2026-1731&lt;/a&gt; BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt;&amp;nbsp;established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/known-exploited-vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&lt;/p&gt;
</description>
  <pubDate>Fri, 13 Feb 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24552</guid>
    </item>
<item>
  <title>CISA Adds Four Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/12/cisa-adds-four-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added four new vulnerabilities to its &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2024-43468&quot; target=&quot;_blank&quot;&gt;CVE-2024-43468&lt;/a&gt; Microsoft Configuration Manager SQL Injection Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-15556&quot; target=&quot;_blank&quot;&gt;CVE-2025-15556&lt;/a&gt; Notepad++ Download of Code Without Integrity Check Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2025-40536&quot; target=&quot;_blank&quot;&gt;CVE-2025-40536&lt;/a&gt; SolarWinds Web Help Desk Security Control Bypass Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.cve.org/CVERecord?id=CVE-2026-20700&quot; target=&quot;_blank&quot;&gt;CVE-2026-20700&lt;/a&gt; Apple Multiple Buffer Overflow Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/binding-operational-directive-22-01&quot;&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the &lt;a href=&quot;https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf&quot;&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href=&quot;/known-exploited-vulnerabilities-catalog&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;79453b83-86b9-4e2f-b1ec-abf73c6eb291&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Known Exploited Vulnerabilities Catalog&quot;&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href=&quot;/known-exploited-vulnerabilities&quot; data-entity-type=&quot;node&quot; data-entity-uuid=&quot;f2adba9a-0404-494c-a90c-4363a4a5c934&quot; data-entity-substitution=&quot;canonical&quot; title=&quot;Reducing the Significant Risk of Known Exploited Vulnerabilities&quot;&gt;specified criteria&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description>
  <pubDate>Thu, 12 Feb 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24547</guid>
    </item>
<item>
  <title>Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps</link>
  <description>&lt;div class=&quot;OutlineElement Ltr SCXW155104668 BCX8&quot;&gt;
&lt;p&gt;&lt;em&gt;The purpose of this Alert is to amplify Poland’s Computer Emergency Response Team (CERT Polska’s) Energy Sector Incident Report published on Jan. 30, 2026, and highlight key mitigations for Energy Sector stakeholders.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;In December 2025, a malicious cyber actor(s) targeted and compromised operational technology (OT) and industrial control systems (ICS) in Poland’s Energy Sector—specifically renewable energy plants, a combined heat and power plant, and a manufacturing sector company—in a cyber incident. The malicious cyber activity highlights the need for critical infrastructure entities with vulnerable edge devices to act now to strengthen their cybersecurity posture against cyber threat activities targeting OT and ICS.&lt;/p&gt;
&lt;p&gt;A malicious cyber actor(s) gained initial access in this incident through vulnerable internet-facing edge devices, subsequently deploying wiper malware and causing damage to remote terminal units (RTUs). The malicious cyber activity caused loss of view and control between facilities and distribution system operators, destroyed data on human machine interfaces (HMIs), and corrupted system firmware on OT devices. While the affected renewable energy systems continued production, the system operator could not control or monitor them according to their intended design.&lt;a href=&quot;#Note1&quot;&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div class=&quot;OutlineElement Ltr SCXW38387541 BCX8&quot;&gt;
&lt;p&gt;CERT Polska’s incident report highlights:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ListContainerWrapper SCXW38387541 BCX8&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Vulnerable edge devices remain a prime target for threat actors.
&lt;ul&gt;
&lt;li&gt;As indicated by CISA’s &lt;a href=&quot;https://www.cisa.gov/news-events/directives/bod-26-02-mitigating-risk-end-support-edge-devices&quot;&gt;Binding Operational Directive (BOD) 26-02: Mitigating Risk From End-of-Support Edge Devices&lt;/a&gt;, end-of-support edge devices pose significant risks.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;OT devices without firmware verification can be permanently damaged.
&lt;ul&gt;
&lt;li&gt;Operators should prioritize updates that allow firmware verification when available; if updates are not immediately feasible, ensure that cyber incident response plans account for inoperative OT devices to mitigate prolonged outages.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Threat actors leveraged default credentials, a vulnerability not limited to specific vendors, to pivot onto the HMI and RTUs.
&lt;ul&gt;
&lt;li&gt;Operators should immediately change default passwords and establish requirements for integrators or OT suppliers to enforce password changes in the future.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;CISA and the Department of Energy’s Office of Cybersecurity, Energy Security, and Emergency Response (DOE CESER) urge OT asset owners and operators to review the following resources for more information about the malicious activity and mitigations:&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;ListContainerWrapper SCXW38387541 BCX8&quot;&gt;
&lt;ul&gt;
&lt;li&gt;CERT Polska’s &lt;a href=&quot;https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/&quot; target=&quot;_blank&quot;&gt;Energy Sector Incident Report - 29 December 2025&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;CISA’s joint fact sheet with FBI, EPA, and DOE &lt;a href=&quot;https://www.cisa.gov/resources-tools/resources/primary-mitigations-reduce-cyber-threats-operational-technology&quot;&gt;Primary Mitigations to Reduce Cyber Threats to Operational Technology&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;DOE’s Energy Threat Analysis Center’s threat advisories.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;Acknowledgements&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;DOE CESER and CERT Polska contributed to this Alert.&lt;/p&gt;
&lt;div class=&quot;OutlineElement Ltr SCXW147436174 BCX8&quot;&gt;
&lt;h2&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;&amp;nbsp;&lt;/h2&gt;
&lt;div&gt;
&lt;p&gt;The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a class=&quot;ck-anchor&quot; id=&quot;Note1&quot;&gt;&lt;/a&gt;CERT Polska, “Energy Sector Incident Report - 29 December 2025,” Naukowa i Akademicka Sieć Komputerowa Poland&lt;em&gt;,&lt;/em&gt; last modified January 30, 2026, &lt;a href=&quot;https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/&quot; target=&quot;_blank&quot;&gt;https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description>
  <pubDate>Tue, 10 Feb 26 12:00:00 +0000</pubDate>
    <dc:creator>CISA</dc:creator>
    <guid isPermaLink="false">/node/24515</guid>
    </item>

  </channel>
</rss>
