{"metadata": {"count": 1583, "page": 1, "per_page": 100}, "data": [{"uuid": "68f56b4d-2992-4a6d-9bb4-f044935ee9a6", "vulnerability": {"vulnId": "CVE-2024-57726", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "68f56b4d-2992-4a6d-9bb4-f044935ee9a6"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-24T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-24T00:00:00Z", "recorded_at": "2026-04-24T18:00:01Z", "first_seen_at": "2026-04-24T00:00:00Z"}, "scope": {"notes": "KEV entry: SimpleHelp Missing Authorization Vulnerability | Affected: SimpleHelp  / SimpleHelp | Description: SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-05-08 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57726"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-862"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "SimpleHelp", "due_date": "2026-05-08", "date_added": "2026-04-24", "vendorProject": "SimpleHelp ", "vulnerabilityName": "SimpleHelp Missing Authorization Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-57726", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-57726"}]}, {"uuid": "b07d8eb5-c304-4ba3-8be6-1c53a1cc6de9", "vulnerability": {"vulnId": "CVE-2024-57728", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "b07d8eb5-c304-4ba3-8be6-1c53a1cc6de9"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-24T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-24T00:00:00Z", "recorded_at": "2026-04-24T18:00:01Z", "first_seen_at": "2026-04-24T00:00:00Z"}, "scope": {"notes": "KEV entry: SimpleHelp Path Traversal Vulnerability | Affected: SimpleHelp  / SimpleHelp | Description: SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-05-08 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier ; https://nvd.nist.gov/vuln/detail/CVE-2024-57728"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-22"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "SimpleHelp", "due_date": "2026-05-08", "date_added": "2026-04-24", "vendorProject": "SimpleHelp ", "vulnerabilityName": "SimpleHelp Path Traversal Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-57728", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-57728"}]}, {"uuid": "d14827f2-8095-491f-b8b1-9debab68dc43", "vulnerability": {"vulnId": "CVE-2024-7399", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "d14827f2-8095-491f-b8b1-9debab68dc43"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-24T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-24T00:00:00Z", "recorded_at": "2026-04-24T18:00:01Z", "first_seen_at": "2026-04-24T00:00:00Z"}, "scope": {"notes": "KEV entry: Samsung MagicINFO 9 Server Path Traversal Vulnerability | Affected: Samsung / MagicINFO 9 Server | Description: Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-05-08 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://security.samsungtv.com/securityUpdates ; https://nvd.nist.gov/vuln/detail/CVE-2024-7399"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-22", "CWE-434"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "MagicINFO 9 Server", "due_date": "2026-05-08", "date_added": "2026-04-24", "vendorProject": "Samsung", "vulnerabilityName": "Samsung MagicINFO 9 Server Path Traversal Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-7399", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-7399"}]}, {"uuid": "5dc1488b-5c54-4d00-829d-88aaa1cfd57b", "vulnerability": {"vulnId": "CVE-2025-29635", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "5dc1488b-5c54-4d00-829d-88aaa1cfd57b"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-24T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-24T00:00:00Z", "recorded_at": "2026-04-24T18:00:01Z", "first_seen_at": "2026-04-24T00:00:00Z"}, "scope": {"notes": "KEV entry: D-Link DIR-823X Command Injection Vulnerability | Affected: D-Link / DIR-823X | Description: D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-05-08 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10469 ; https://nvd.nist.gov/vuln/detail/CVE-2025-29635"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-77"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "DIR-823X", "due_date": "2026-05-08", "date_added": "2026-04-24", "vendorProject": "D-Link", "vulnerabilityName": "D-Link DIR-823X Command Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-29635", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-29635"}]}, {"uuid": "f913a5b3-647b-46ea-8ec0-dd04c0efe51e", "vulnerability": {"vulnId": "CVE-2026-39987", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "f913a5b3-647b-46ea-8ec0-dd04c0efe51e"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-23T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-23T00:00:00Z", "recorded_at": "2026-04-23T18:00:02Z", "first_seen_at": "2026-04-23T00:00:00Z"}, "scope": {"notes": "KEV entry: Marimo Remote Code Execution Vulnerability | Affected: Marimo / Marimo | Description: Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-05-07 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc ; https://nvd.nist.gov/vuln/detail/CVE-2026-39987"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-306"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Marimo", "due_date": "2026-05-07", "date_added": "2026-04-23", "vendorProject": "Marimo", "vulnerabilityName": "Marimo Remote Code Execution Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-39987", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-39987"}]}, {"uuid": "fc816bbe-ddcd-4efd-9006-fbf1cf1b0f77", "vulnerability": {"vulnId": "CVE-2026-33825", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "fc816bbe-ddcd-4efd-9006-fbf1cf1b0f77"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-22T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-22T00:00:00Z", "recorded_at": "2026-04-22T20:00:01Z", "first_seen_at": "2026-04-22T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Defender Insufficient Granularity of Access Control Vulnerability | Affected: Microsoft / Defender | Description: Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-05-06 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33825"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-1220"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Defender", "due_date": "2026-05-06", "date_added": "2026-04-22", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Defender Insufficient Granularity of Access Control Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-33825", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-33825"}]}, {"uuid": "bbca45e0-1c88-47c2-b719-5614242ac253", "vulnerability": {"vulnId": "CVE-2024-27199", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "bbca45e0-1c88-47c2-b719-5614242ac253"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-20T00:00:00Z", "recorded_at": "2026-04-20T20:00:02Z", "first_seen_at": "2026-04-20T00:00:00Z"}, "scope": {"notes": "KEV entry: JetBrains TeamCity Relative Path Traversal Vulnerability | Affected: JetBrains / TeamCity | Description: JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-05-04 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.jetbrains.com/privacy-security/issues-fixed/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-27199"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-23"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "TeamCity", "due_date": "2026-05-04", "date_added": "2026-04-20", "vendorProject": "JetBrains", "vulnerabilityName": "JetBrains TeamCity Relative Path Traversal Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-27199", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-27199"}]}, {"uuid": "b9ad58c5-efa2-4622-bf00-50d818be875a", "vulnerability": {"vulnId": "CVE-2025-32975", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "b9ad58c5-efa2-4622-bf00-50d818be875a"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-20T00:00:00Z", "recorded_at": "2026-04-20T20:00:02Z", "first_seen_at": "2026-04-20T00:00:00Z"}, "scope": {"notes": "KEV entry: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability | Affected: Quest / KACE Systems Management Appliance (SMA) | Description: Quest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-05-04 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32975"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-287"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "KACE Systems Management Appliance (SMA)", "due_date": "2026-05-04", "date_added": "2026-04-20", "vendorProject": "Quest", "vulnerabilityName": "Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-32975", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-32975"}]}, {"uuid": "f027f136-8e3d-44c8-9bf6-c9060b220e88", "vulnerability": {"vulnId": "CVE-2026-20128", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "f027f136-8e3d-44c8-9bf6-c9060b220e88"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-20T00:00:00Z", "recorded_at": "2026-04-20T20:00:02Z", "first_seen_at": "2026-04-20T00:00:00Z"}, "scope": {"notes": "KEV entry: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability | Affected: Cisco / Catalyst SD-WAN Manager | Description: Cisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user. | Required action: Please adhere to CISA\u2019s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA\u2019s Emergency Directive 26-03 (URL listed below in Notes) and CISA\u2019s \u201cHunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Due date: 2026-04-23 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v ; https://nvd.nist.gov/vuln/detail/CVE-2026-20128"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-257"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Catalyst SD-WAN Manager", "due_date": "2026-04-23", "date_added": "2026-04-20", "vendorProject": "Cisco", "vulnerabilityName": "Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-20128", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-20128"}]}, {"uuid": "b1218d5a-93d3-4341-ac99-e0f7a9b130ee", "vulnerability": {"vulnId": "CVE-2025-48700", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "b1218d5a-93d3-4341-ac99-e0f7a9b130ee"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-20T00:00:00Z", "recorded_at": "2026-04-20T20:00:02Z", "first_seen_at": "2026-04-20T00:00:00Z"}, "scope": {"notes": "KEV entry: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability | Affected: Synacor / Zimbra Collaboration Suite (ZCS) | Description: Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that could allow attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-23 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2025-48700"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-79"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Zimbra Collaboration Suite (ZCS)", "due_date": "2026-04-23", "date_added": "2026-04-20", "vendorProject": "Synacor", "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-48700", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-48700"}]}, {"uuid": "9cd349a3-dc70-4743-8fe8-4ddf3de1a525", "vulnerability": {"vulnId": "CVE-2023-27351", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "9cd349a3-dc70-4743-8fe8-4ddf3de1a525"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-20T00:00:00Z", "recorded_at": "2026-04-20T20:00:02Z", "first_seen_at": "2026-04-20T00:00:00Z"}, "scope": {"notes": "KEV entry: PaperCut NG/MF Improper Authentication Vulnerability | Affected: PaperCut / NG/MF | Description: PaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-05-04 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.papercut.com/kb/Main/PO-1216-and-PO-1219 ; https://nvd.nist.gov/vuln/detail/CVE-2023-27351"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-287"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "NG/MF", "due_date": "2026-05-04", "date_added": "2026-04-20", "vendorProject": "PaperCut", "vulnerabilityName": "PaperCut NG/MF Improper Authentication Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2023-27351", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-27351"}]}, {"uuid": "c18ce586-6a6b-4c0a-b55c-a4611ceefd1a", "vulnerability": {"vulnId": "CVE-2025-2749", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "c18ce586-6a6b-4c0a-b55c-a4611ceefd1a"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-20T00:00:00Z", "recorded_at": "2026-04-20T20:00:02Z", "first_seen_at": "2026-04-20T00:00:00Z"}, "scope": {"notes": "KEV entry: Kentico Xperience Path Traversal Vulnerability | Affected: Kentico / Kentico Xperience | Description: Kentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-05-04 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://devnet.kentico.com/download/hotfixes ; https://nvd.nist.gov/vuln/detail/CVE-2025-2749"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-22", "CWE-434"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Kentico Xperience", "due_date": "2026-05-04", "date_added": "2026-04-20", "vendorProject": "Kentico", "vulnerabilityName": "Kentico Xperience Path Traversal Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-2749", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-2749"}]}, {"uuid": "8d47f19f-e8ed-42ed-a12a-bddd1774ed4d", "vulnerability": {"vulnId": "CVE-2026-20133", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "8d47f19f-e8ed-42ed-a12a-bddd1774ed4d"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-20T00:00:00Z", "recorded_at": "2026-04-20T20:00:02Z", "first_seen_at": "2026-04-20T00:00:00Z"}, "scope": {"notes": "KEV entry: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability | Affected: Cisco / Catalyst SD-WAN Manager | Description: Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems. | Required action: Please adhere to CISA\u2019s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA\u2019s Emergency Directive 26-03 (URL listed below in Notes) and CISA\u2019s \u201cHunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Due date: 2026-04-23 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v ; https://nvd.nist.gov/vuln/detail/CVE-2026-20133"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-200"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Catalyst SD-WAN Manager", "due_date": "2026-04-23", "date_added": "2026-04-20", "vendorProject": "Cisco", "vulnerabilityName": "Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-20133", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-20133"}]}, {"uuid": "c289615a-7fd9-4e6a-b760-88e0035a97f7", "vulnerability": {"vulnId": "CVE-2026-20122", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "c289615a-7fd9-4e6a-b760-88e0035a97f7"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-20T00:00:00Z", "recorded_at": "2026-04-20T20:00:02Z", "first_seen_at": "2026-04-20T00:00:00Z"}, "scope": {"notes": "KEV entry: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability | Affected: Cisco / Catalyst SD-WAN Manger | Description: Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges. | Required action: Please adhere to CISA\u2019s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA\u2019s Emergency Directive 26-03 (URL listed below in Notes) and CISA\u2019s \u201cHunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Due date: 2026-04-23 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v ; https://nvd.nist.gov/vuln/detail/ CVE-2026-20122"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-648"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Catalyst SD-WAN Manger", "due_date": "2026-04-23", "date_added": "2026-04-20", "vendorProject": "Cisco", "vulnerabilityName": "Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-20122", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-20122"}]}, {"uuid": "18d6e60a-7a23-4a97-abb3-a5b9fc3982e4", "vulnerability": {"vulnId": "CVE-2026-34197", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "18d6e60a-7a23-4a97-abb3-a5b9fc3982e4"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-16T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-16T00:00:00Z", "recorded_at": "2026-04-16T18:00:01Z", "first_seen_at": "2026-04-16T00:00:00Z"}, "scope": {"notes": "KEV entry: Apache ActiveMQ Improper Input Validation Vulnerability | Affected: Apache / ActiveMQ | Description: Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-30 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt ; https://nvd.nist.gov/vuln/detail/CVE-2026-34197"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-20", "CWE-94"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "ActiveMQ", "due_date": "2026-04-30", "date_added": "2026-04-16", "vendorProject": "Apache", "vulnerabilityName": "Apache ActiveMQ Improper Input Validation Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-34197", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-34197"}]}, {"uuid": "ed5ef331-6a92-4311-98b4-7312c0e75edb", "vulnerability": {"vulnId": "CVE-2026-32201", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "ed5ef331-6a92-4311-98b4-7312c0e75edb"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-14T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-14T00:00:00Z", "recorded_at": "2026-04-14T18:00:02Z", "first_seen_at": "2026-04-14T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft SharePoint Server Improper Input Validation Vulnerability | Affected: Microsoft / SharePoint Server | Description: Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-28 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201 ; https://nvd.nist.gov/vuln/detail/CVE-2026-32201"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-20"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "SharePoint Server", "due_date": "2026-04-28", "date_added": "2026-04-14", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft SharePoint Server Improper Input Validation Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-32201", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-32201"}]}, {"uuid": "defc1339-959e-42cc-98bb-9e2a5e3e11b5", "vulnerability": {"vulnId": "CVE-2009-0238", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "defc1339-959e-42cc-98bb-9e2a5e3e11b5"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-14T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-14T00:00:00Z", "recorded_at": "2026-04-14T18:00:02Z", "first_seen_at": "2026-04-14T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Office Remote Code Execution | Affected: Microsoft / Office | Description: Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-28 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009 ; https://nvd.nist.gov/vuln/detail/CVE-2009-0238"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-94"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Office", "due_date": "2026-04-28", "date_added": "2026-04-14", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Office Remote Code Execution", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2009-0238", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2009-0238"}]}, {"uuid": "3f9a262f-6bab-4d23-a632-e2ff6d961496", "vulnerability": {"vulnId": "CVE-2026-34621", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "3f9a262f-6bab-4d23-a632-e2ff6d961496"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-13T00:00:00Z", "recorded_at": "2026-04-13T18:00:02Z", "first_seen_at": "2026-04-13T00:00:00Z"}, "scope": {"notes": "KEV entry: Adobe Acrobat and Reader Prototype Pollution Vulnerability | Affected: Adobe / Acrobat and Reader | Description: Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-27 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://helpx.adobe.com/security/products/acrobat/apsb26-43.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-34621"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-1321"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Acrobat and Reader", "due_date": "2026-04-27", "date_added": "2026-04-13", "vendorProject": "Adobe", "vulnerabilityName": "Adobe Acrobat and Reader Prototype Pollution Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-34621", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-34621"}]}, {"uuid": "52829c76-d4e5-45ed-8859-ae33cd4e668f", "vulnerability": {"vulnId": "CVE-2026-21643", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "52829c76-d4e5-45ed-8859-ae33cd4e668f"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-13T00:00:00Z", "recorded_at": "2026-04-13T18:00:02Z", "first_seen_at": "2026-04-13T00:00:00Z"}, "scope": {"notes": "KEV entry: Fortinet SQL Injection Vulnerability | Affected: Fortinet / FortiClient EMS | Description: Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-16 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://fortiguard.fortinet.com/psirt/FG-IR-25-1142 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21643"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-89"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "FortiClient EMS", "due_date": "2026-04-16", "date_added": "2026-04-13", "vendorProject": "Fortinet", "vulnerabilityName": "Fortinet SQL Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-21643", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-21643"}]}, {"uuid": "8ba2932f-6591-4ff9-afb5-bc16564f4ad3", "vulnerability": {"vulnId": "CVE-2020-9715", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "8ba2932f-6591-4ff9-afb5-bc16564f4ad3"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-13T00:00:00Z", "recorded_at": "2026-04-13T18:00:02Z", "first_seen_at": "2026-04-13T00:00:00Z"}, "scope": {"notes": "KEV entry: Adobe Acrobat Use-After-Free Vulnerability | Affected: Adobe / Acrobat | Description: Adobe Acrobat contains a use-after-free vulnerability that allows for code execution | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-27 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://helpx.adobe.com/security/products/acrobat/apsb20-48.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-9715"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-416"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Acrobat", "due_date": "2026-04-27", "date_added": "2026-04-13", "vendorProject": "Adobe", "vulnerabilityName": "Adobe Acrobat Use-After-Free Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2020-9715", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-9715"}]}, {"uuid": "14e73713-aaf2-4385-b634-5b3aa493a7e5", "vulnerability": {"vulnId": "CVE-2023-36424", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "14e73713-aaf2-4385-b634-5b3aa493a7e5"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-13T00:00:00Z", "recorded_at": "2026-04-13T18:00:02Z", "first_seen_at": "2026-04-13T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Windows Out-of-Bounds Read Vulnerability | Affected: Microsoft / Windows | Description: Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-27 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36424 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36424"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-125"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Windows", "due_date": "2026-04-27", "date_added": "2026-04-13", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Windows Out-of-Bounds Read Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2023-36424", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-36424"}]}, {"uuid": "cdd79954-0a1e-44e5-94cd-c7b0eb7c1a75", "vulnerability": {"vulnId": "CVE-2023-21529", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "cdd79954-0a1e-44e5-94cd-c7b0eb7c1a75"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-13T00:00:00Z", "recorded_at": "2026-04-13T18:00:02Z", "first_seen_at": "2026-04-13T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability | Affected: Microsoft / Exchange Server | Description: Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-27 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529 ; https://nvd.nist.gov/vuln/detail/CVE-2023-21529"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-502"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Exchange Server", "due_date": "2026-04-27", "date_added": "2026-04-13", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2023-21529", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-21529"}]}, {"uuid": "b5f393ae-0636-4b55-8ed3-f82bd348e252", "vulnerability": {"vulnId": "CVE-2025-60710", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "b5f393ae-0636-4b55-8ed3-f82bd348e252"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-13T00:00:00Z", "recorded_at": "2026-04-13T18:00:02Z", "first_seen_at": "2026-04-13T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Windows Link Following Vulnerability | Affected: Microsoft / Windows | Description: Microsoft Windows contains a link following vulnerability that allows for privilege escalation | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-27 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710 ; https://nvd.nist.gov/vuln/detail/CVE-2025-60710"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-59"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Windows", "due_date": "2026-04-27", "date_added": "2026-04-13", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Windows Link Following Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-60710", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-60710"}]}, {"uuid": "2a1f1215-29b9-4723-bd81-ea99eb702762", "vulnerability": {"vulnId": "CVE-2012-1854", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "2a1f1215-29b9-4723-bd81-ea99eb702762"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-13T00:00:00Z", "recorded_at": "2026-04-13T18:00:02Z", "first_seen_at": "2026-04-13T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability | Affected: Microsoft / Visual Basic for Applications (VBA) | Description: Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-27 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://learn.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046 ; https://nvd.nist.gov/vuln/detail/CVE-2012-1854"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-426"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Visual Basic for Applications (VBA)", "due_date": "2026-04-27", "date_added": "2026-04-13", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2012-1854", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2012-1854"}]}, {"uuid": "c52328f5-72dd-46fe-a87e-8e17afeb9001", "vulnerability": {"vulnId": "CVE-2026-1340", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "c52328f5-72dd-46fe-a87e-8e17afeb9001"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-08T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-08T00:00:00Z", "recorded_at": "2026-04-08T18:00:01Z", "first_seen_at": "2026-04-08T00:00:00Z"}, "scope": {"notes": "KEV entry: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability | Affected: Ivanti / Endpoint Manager Mobile (EPMM) | Description: Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-11 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please see: https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0S-5.noarch.rpm ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0L-5.noarch.rpm ; https://nvd.nist.gov/vuln/detail/CVE-2026-1340"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-94"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Endpoint Manager Mobile (EPMM)", "due_date": "2026-04-11", "date_added": "2026-04-08", "vendorProject": "Ivanti", "vulnerabilityName": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-1340", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-1340"}]}, {"uuid": "b8428bd9-d6a6-41e3-98ea-8e38bb86e711", "vulnerability": {"vulnId": "CVE-2026-35616", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "b8428bd9-d6a6-41e3-98ea-8e38bb86e711"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-06T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-06T00:00:00Z", "recorded_at": "2026-04-06T16:00:02Z", "first_seen_at": "2026-04-06T00:00:00Z"}, "scope": {"notes": "KEV entry: Fortinet FortiClient EMS Improper Access Control Vulnerability | Affected: Fortinet / FortiClient EMS | Description: Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-09 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://fortiguard.fortinet.com/psirt/FG-IR-26-099 ; https://nvd.nist.gov/vuln/detail/CVE-2026-35616"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-284"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "FortiClient EMS", "due_date": "2026-04-09", "date_added": "2026-04-06", "vendorProject": "Fortinet", "vulnerabilityName": "Fortinet FortiClient EMS Improper Access Control Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-35616", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-35616"}]}, {"uuid": "e60e9c85-14d2-4a0c-9c7f-0f44f51db470", "vulnerability": {"vulnId": "CVE-2026-3502", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "e60e9c85-14d2-4a0c-9c7f-0f44f51db470"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-02T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-02T00:00:00Z", "recorded_at": "2026-04-02T21:00:01Z", "first_seen_at": "2026-04-02T00:00:00Z"}, "scope": {"notes": "KEV entry: TrueConf Client Download of Code Without Integrity Check Vulnerability | Affected: TrueConf / Client | Description: TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-16 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://trueconf.com/blog/update/trueconf-8-5 ; https://trueconf.com/downloads/windows.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3502"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-494"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Client", "due_date": "2026-04-16", "date_added": "2026-04-02", "vendorProject": "TrueConf", "vulnerabilityName": "TrueConf Client Download of Code Without Integrity Check Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-3502", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-3502"}]}, {"uuid": "322c93a1-dc97-4a1d-8379-bc0c6cd58ef2", "vulnerability": {"vulnId": "CVE-2026-5281", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "322c93a1-dc97-4a1d-8379-bc0c6cd58ef2"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-04-01T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-04-01T00:00:00Z", "recorded_at": "2026-04-01T20:00:01Z", "first_seen_at": "2026-04-01T00:00:00Z"}, "scope": {"notes": "KEV entry: Google Dawn Use-After-Free Vulnerability | Affected: Google / Dawn | Description: Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-15 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): This vulnerability affects an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-5281 "}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-416"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Dawn", "due_date": "2026-04-15", "date_added": "2026-04-01", "vendorProject": "Google", "vulnerabilityName": "Google Dawn Use-After-Free Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-5281", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-5281"}]}, {"uuid": "9aca8abc-a120-4761-a084-9b0e4beff4bf", "vulnerability": {"vulnId": "CVE-2026-3055", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "9aca8abc-a120-4761-a084-9b0e4beff4bf"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-30T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-30T00:00:00Z", "recorded_at": "2026-03-30T20:00:02Z", "first_seen_at": "2026-03-30T00:00:00Z"}, "scope": {"notes": "KEV entry: Citrix NetScaler Out-of-Bounds Read Vulnerability | Affected: Citrix / NetScaler | Description: Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-02 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368 ; https://nvd.nist.gov/vuln/detail/CVE-2026-3055"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-125"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "NetScaler", "due_date": "2026-04-02", "date_added": "2026-03-30", "vendorProject": "Citrix", "vulnerabilityName": "Citrix NetScaler Out-of-Bounds Read Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-3055", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-3055"}]}, {"uuid": "2c8249b3-5391-4d17-ac4a-ef7b2ef3f258", "vulnerability": {"vulnId": "CVE-2025-53521", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "2c8249b3-5391-4d17-ac4a-ef7b2ef3f258"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-27T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-27T00:00:00Z", "recorded_at": "2026-03-27T20:00:01Z", "first_seen_at": "2026-03-27T00:00:00Z"}, "scope": {"notes": "KEV entry: F5 BIG-IP Unspecified Vulnerability | Affected: F5 / BIG-IP | Description: F5 BIG-IP AMP contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-30 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): Please adhere to F5\u2019s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible F5 products affected by this vulnerability. For more information please see: https://my.f5.com/manage/s/article/K000156741 ; https://my.f5.com/manage/s/article/K000160486 ; https://my.f5.com/manage/s/article/K11438344 ; https://nvd.nist.gov/vuln/detail/CVE-2025-53521"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": [], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "BIG-IP", "due_date": "2026-03-30", "date_added": "2026-03-27", "vendorProject": "F5", "vulnerabilityName": "F5 BIG-IP Unspecified Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-53521", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-53521"}]}, {"uuid": "da2da2c9-d80a-4c5e-a8f3-fd37904e9ee6", "vulnerability": {"vulnId": "CVE-2026-33634", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "da2da2c9-d80a-4c5e-a8f3-fd37904e9ee6"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-26T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-26T00:00:00Z", "recorded_at": "2026-03-26T18:00:02Z", "first_seen_at": "2026-03-26T00:00:00Z"}, "scope": {"notes": "KEV entry: Aquasecurity Trivy Embedded Malicious Code Vulnerability | Affected: Aquasecurity / Trivy | Description: Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-09 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): This vulnerability involves a supply\u2011chain compromise in a product that may be used across multiple products and environments. Additional vendor\u2011provided guidance must be followed to ensure full remediation. For more information, please see: https://github.com/advisories/GHSA-69fq-xp46-6x23 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33634"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-506"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Trivy", "due_date": "2026-04-09", "date_added": "2026-03-26", "vendorProject": "Aquasecurity", "vulnerabilityName": "Aquasecurity Trivy Embedded Malicious Code Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-33634", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-33634"}]}, {"uuid": "ef803cef-0bc7-4ed2-ba35-bd221d74c9df", "vulnerability": {"vulnId": "CVE-2026-33017", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "ef803cef-0bc7-4ed2-ba35-bd221d74c9df"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-25T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-25T00:00:00Z", "recorded_at": "2026-03-25T18:00:01Z", "first_seen_at": "2026-03-25T00:00:00Z"}, "scope": {"notes": "KEV entry: Langflow Code Injection Vulnerability | Affected: Langflow / Langflow | Description: Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-08 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx ; https://nvd.nist.gov/vuln/detail/CVE-2026-33017"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-94", "CWE-95", "CWE-306"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Langflow", "due_date": "2026-04-08", "date_added": "2026-03-25", "vendorProject": "Langflow", "vulnerabilityName": "Langflow Code Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-33017", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-33017"}]}, {"uuid": "53903deb-ca5c-45b4-abfd-7aa40ea28763", "vulnerability": {"vulnId": "CVE-2025-31277", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "53903deb-ca5c-45b4-abfd-7aa40ea28763"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-20T00:00:00Z", "recorded_at": "2026-03-20T16:00:01Z", "first_seen_at": "2026-03-20T00:00:00Z"}, "scope": {"notes": "KEV entry: Apple Multiple Products Buffer Overflow Vulnerability | Affected: Apple / Multiple Products | Description: Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://support.apple.com/en-us/124147 ; https://support.apple.com/en-us/124149 ; https://support.apple.com/en-us/124152 ; https://support.apple.com/en-us/124153 ; https://support.apple.com/en-us/124155 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31277"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-119"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Products", "due_date": "2026-04-03", "date_added": "2026-03-20", "vendorProject": "Apple", "vulnerabilityName": "Apple Multiple Products Buffer Overflow Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-31277", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-31277"}]}, {"uuid": "8daa80d1-62be-4cf7-8e1b-3cec0f674c85", "vulnerability": {"vulnId": "CVE-2025-43520", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "8daa80d1-62be-4cf7-8e1b-3cec0f674c85"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-20T00:00:00Z", "recorded_at": "2026-03-20T16:00:01Z", "first_seen_at": "2026-03-20T00:00:00Z"}, "scope": {"notes": "KEV entry: Apple Multiple Products Classic Buffer Overflow Vulnerability | Affected: Apple / Multiple Products | Description: Apple watchOS, iOS, iPadOS, macOS, visionOS, tvOS, and iPadOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://support.apple.com/en-us/125632 ; https://support.apple.com/en-us/125633 ; https://support.apple.com/en-us/125634 ; https://support.apple.com/en-us/125635 ; https://support.apple.com/en-us/125636 ; https://support.apple.com/en-us/125637 ; https://support.apple.com/en-us/125638 ; https://support.apple.com/en-us/125639 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43520"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-120"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Products", "due_date": "2026-04-03", "date_added": "2026-03-20", "vendorProject": "Apple", "vulnerabilityName": "Apple Multiple Products Classic Buffer Overflow Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-43520", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-43520"}]}, {"uuid": "88a0376b-27d6-4197-a948-91ca79c3ec62", "vulnerability": {"vulnId": "CVE-2025-43510", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "88a0376b-27d6-4197-a948-91ca79c3ec62"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-20T00:00:00Z", "recorded_at": "2026-03-20T16:00:01Z", "first_seen_at": "2026-03-20T00:00:00Z"}, "scope": {"notes": "KEV entry: Apple Multiple Products Improper Locking Vulnerability | Affected: Apple / Multiple Products | Description: Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://support.apple.com/en-us/125632 ; https://support.apple.com/en-us/125633 ; https://support.apple.com/en-us/125634 ; https://support.apple.com/en-us/125635 ; https://support.apple.com/en-us/125636 ; https://support.apple.com/en-us/125637 ; https://support.apple.com/en-us/125638 ; https://support.apple.com/en-us/125639 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43510"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-667"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Products", "due_date": "2026-04-03", "date_added": "2026-03-20", "vendorProject": "Apple", "vulnerabilityName": "Apple Multiple Products Improper Locking Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-43510", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-43510"}]}, {"uuid": "6900e5ea-0dfa-4c67-bffb-321ea401ee36", "vulnerability": {"vulnId": "CVE-2025-54068", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "6900e5ea-0dfa-4c67-bffb-321ea401ee36"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-20T00:00:00Z", "recorded_at": "2026-03-20T16:00:01Z", "first_seen_at": "2026-03-20T00:00:00Z"}, "scope": {"notes": "KEV entry: Laravel Livewire Code Injection Vulnerability | Affected: Laravel / Livewire | Description: Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3 ; https://github.com/livewire/livewire/commit/ef04be759da41b14d2d129e670533180a44987dc ; https://nvd.nist.gov/vuln/detail/CVE-2025-54068"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-94"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Livewire", "due_date": "2026-04-03", "date_added": "2026-03-20", "vendorProject": "Laravel", "vulnerabilityName": "Laravel Livewire Code Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-54068", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-54068"}]}, {"uuid": "a365d232-f868-4ea6-b26f-172379e818a8", "vulnerability": {"vulnId": "CVE-2025-32432", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "a365d232-f868-4ea6-b26f-172379e818a8"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-20T00:00:00Z", "recorded_at": "2026-03-20T16:00:01Z", "first_seen_at": "2026-03-20T00:00:00Z"}, "scope": {"notes": "KEV entry: Craft CMS Code Injection Vulnerability | Affected: Craft CMS / Craft CMS | Description: Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://craftcms.com/knowledge-base/craft-cms-cve-2025-32432 ; https://github.com/craftcms/cms/security/advisories/GHSA-f3gw-9ww9-jmc3 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32432"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-94"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Craft CMS", "due_date": "2026-04-03", "date_added": "2026-03-20", "vendorProject": "Craft CMS", "vulnerabilityName": "Craft CMS Code Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-32432", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-32432"}]}, {"uuid": "43d9c7fd-5b2c-448e-93e6-43d61e80822d", "vulnerability": {"vulnId": "CVE-2026-20131", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "43d9c7fd-5b2c-448e-93e6-43d61e80822d"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-19T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-19T00:00:00Z", "recorded_at": "2026-03-19T17:00:01Z", "first_seen_at": "2026-03-19T00:00:00Z"}, "scope": {"notes": "KEV entry: Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability | Affected: Cisco / Secure Firewall Management Center (FMC) | Description: Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-22 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh ; https://nvd.nist.gov/vuln/detail/CVE-2026-20131"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-502"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Secure Firewall Management Center (FMC)", "due_date": "2026-03-22", "date_added": "2026-03-19", "vendorProject": "Cisco", "vulnerabilityName": "Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2026-20131", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-20131"}]}, {"uuid": "55d6c9b1-6d03-4d64-9932-622f93a26882", "vulnerability": {"vulnId": "CVE-2026-20963", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "55d6c9b1-6d03-4d64-9932-622f93a26882"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-18T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-18T00:00:00Z", "recorded_at": "2026-03-18T21:00:01Z", "first_seen_at": "2026-03-18T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability | Affected: Microsoft / SharePoint | Description: Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-21 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963 ; https://nvd.nist.gov/vuln/detail/CVE-2026-20963"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-502"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "SharePoint", "due_date": "2026-03-21", "date_added": "2026-03-18", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft SharePoint Deserialization of Untrusted Data Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-20963", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-20963"}]}, {"uuid": "ff5628bd-87ca-43c5-b5a5-913f4b95503c", "vulnerability": {"vulnId": "CVE-2025-66376", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "ff5628bd-87ca-43c5-b5a5-913f4b95503c"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-18T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-18T00:00:00Z", "recorded_at": "2026-03-18T18:00:01Z", "first_seen_at": "2026-03-18T00:00:00Z"}, "scope": {"notes": "KEV entry: Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability | Affected: Synacor / Zimbra Collaboration Suite (ZCS) | Description: Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-04-01 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2025-66376"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-79"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Zimbra Collaboration Suite (ZCS)", "due_date": "2026-04-01", "date_added": "2026-03-18", "vendorProject": "Synacor", "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-66376", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-66376"}]}, {"uuid": "c311ed8c-b696-49ba-aeec-8e6dee776dde", "vulnerability": {"vulnId": "CVE-2025-47813", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "c311ed8c-b696-49ba-aeec-8e6dee776dde"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-16T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-16T00:00:00Z", "recorded_at": "2026-03-16T17:00:01Z", "first_seen_at": "2026-03-16T00:00:00Z"}, "scope": {"notes": "KEV entry: Wing FTP Server Information Disclosure Vulnerability | Affected: Wing FTP Server / Wing FTP Server | Description: Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-30 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.wftpserver.com/serverhistory.htm ; https://nvd.nist.gov/vuln/detail/CVE-2025-47813"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-209"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Wing FTP Server", "due_date": "2026-03-30", "date_added": "2026-03-16", "vendorProject": "Wing FTP Server", "vulnerabilityName": "Wing FTP Server Information Disclosure Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-47813", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-47813"}]}, {"uuid": "1351c1b4-9a3c-4538-9a92-30ff873f20ae", "vulnerability": {"vulnId": "CVE-2026-3909", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "1351c1b4-9a3c-4538-9a92-30ff873f20ae"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-13T00:00:00Z", "recorded_at": "2026-03-13T17:00:01Z", "first_seen_at": "2026-03-13T00:00:00Z"}, "scope": {"notes": "KEV entry: Google Skia Out-of-Bounds Write Vulnerability | Affected: Google / Skia | Description: Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-27 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html#:~:text=Google%20is%20aware ; https://nvd.nist.gov/vuln/detail/CVE-2026-3909"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-787"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Skia", "due_date": "2026-03-27", "date_added": "2026-03-13", "vendorProject": "Google", "vulnerabilityName": "Google Skia Out-of-Bounds Write Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-3909", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-3909"}]}, {"uuid": "ab931522-5355-485b-a1b0-a14f2677c5c1", "vulnerability": {"vulnId": "CVE-2026-3910", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "ab931522-5355-485b-a1b0-a14f2677c5c1"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-13T00:00:00Z", "recorded_at": "2026-03-13T17:00:01Z", "first_seen_at": "2026-03-13T00:00:00Z"}, "scope": {"notes": "KEV entry: Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability | Affected: Google / Chromium V8 | Description: Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-27 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3910"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-119"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Chromium V8", "due_date": "2026-03-27", "date_added": "2026-03-13", "vendorProject": "Google", "vulnerabilityName": "Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-3910", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-3910"}]}, {"uuid": "a2a20666-1f2c-43ab-822b-a954de0c6c5a", "vulnerability": {"vulnId": "CVE-2025-68613", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "a2a20666-1f2c-43ab-822b-a954de0c6c5a"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-11T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-11T00:00:00Z", "recorded_at": "2026-03-11T18:00:01Z", "first_seen_at": "2026-03-11T00:00:00Z"}, "scope": {"notes": "KEV entry: n8n Improper Control of Dynamically-Managed Code Resources Vulnerability | Affected: n8n / n8n | Description: n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-25 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp ; https://nvd.nist.gov/vuln/detail/CVE-2025-68613"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-913"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "n8n", "due_date": "2026-03-25", "date_added": "2026-03-11", "vendorProject": "n8n", "vulnerabilityName": "n8n Improper Control of Dynamically-Managed Code Resources Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-68613", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-68613"}]}, {"uuid": "a2a4a88d-a0ab-4c6d-aa6c-7f02fb675fe9", "vulnerability": {"vulnId": "CVE-2026-1603", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "a2a4a88d-a0ab-4c6d-aa6c-7f02fb675fe9"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-09T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-09T00:00:00Z", "recorded_at": "2026-03-09T20:00:01Z", "first_seen_at": "2026-03-09T00:00:00Z"}, "scope": {"notes": "KEV entry: Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability | Affected: Ivanti /  Endpoint Manager (EPM) | Description: Ivanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential data. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-23 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2026-1603"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-288"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": " Endpoint Manager (EPM)", "due_date": "2026-03-23", "date_added": "2026-03-09", "vendorProject": "Ivanti", "vulnerabilityName": "Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-1603", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-1603"}]}, {"uuid": "3c5da77e-c287-483e-ba60-0b605d3697a8", "vulnerability": {"vulnId": "CVE-2025-26399", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "3c5da77e-c287-483e-ba60-0b605d3697a8"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-09T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-09T00:00:00Z", "recorded_at": "2026-03-09T20:00:01Z", "first_seen_at": "2026-03-09T00:00:00Z"}, "scope": {"notes": "KEV entry: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability | Affected: SolarWinds / Web Help Desk | Description: SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-12 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.solarwinds.com/trust-center/security-advisories/cve-2025-26399 ; https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm ; https://nvd.nist.gov/vuln/detail/CVE-2025-26399"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-502"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Web Help Desk", "due_date": "2026-03-12", "date_added": "2026-03-09", "vendorProject": "SolarWinds", "vulnerabilityName": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-26399", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-26399"}]}, {"uuid": "db12fa2c-3b32-4531-b04b-80867eb99654", "vulnerability": {"vulnId": "CVE-2021-22054", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "db12fa2c-3b32-4531-b04b-80867eb99654"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-09T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-09T00:00:00Z", "recorded_at": "2026-03-09T20:00:01Z", "first_seen_at": "2026-03-09T00:00:00Z"}, "scope": {"notes": "KEV entry: Omnissa Workspace ONE Server-Side Request Forgery | Affected: Omnissa / Workspace One UEM | Description: Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-23 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://web.archive.org/web/20211222154335/https://www.vmware.com/security/advisories/VMSA-2021-0029.html ; https://nvd.nist.gov/vuln/detail/CVE-2021-22054"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-918"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Workspace One UEM", "due_date": "2026-03-23", "date_added": "2026-03-09", "vendorProject": "Omnissa", "vulnerabilityName": "Omnissa Workspace ONE Server-Side Request Forgery", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2021-22054", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-22054"}]}, {"uuid": "046d3e04-2933-4363-8f3f-d4d54d54ec9e", "vulnerability": {"vulnId": "CVE-2023-41974", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "046d3e04-2933-4363-8f3f-d4d54d54ec9e"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-05T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-05T00:00:00Z", "recorded_at": "2026-03-05T20:00:01Z", "first_seen_at": "2026-03-05T00:00:00Z"}, "scope": {"notes": "KEV entry: Apple iOS and iPadOS Use-After-Free Vulnerability | Affected: Apple / iOS and iPadOS | Description: Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-26 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://support.apple.com/en-us/HT213938 ; https://support.apple.com/kb/HT213938 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41974"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-416"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "iOS and iPadOS", "due_date": "2026-03-26", "date_added": "2026-03-05", "vendorProject": "Apple", "vulnerabilityName": "Apple iOS and iPadOS Use-After-Free Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2023-41974", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-41974"}]}, {"uuid": "52d34700-f464-4549-8a24-570a7e55b247", "vulnerability": {"vulnId": "CVE-2021-30952", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "52d34700-f464-4549-8a24-570a7e55b247"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-05T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-05T00:00:00Z", "recorded_at": "2026-03-05T20:00:01Z", "first_seen_at": "2026-03-05T00:00:00Z"}, "scope": {"notes": "KEV entry: Apple Multiple Products Integer Overflow or Wraparound Vulnerability | Affected: Apple / Multiple Products | Description: Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted web content that may lead to arbitrary code execution. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-26 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://support.apple.com/en-us/HT212975 ; https://support.apple.com/en-us/HT212976 ; https://support.apple.com/en-us/HT212978 ; https://support.apple.com/en-us/HT212980 ; https://support.apple.com/en-us/HT212982 ; https://nvd.nist.gov/vuln/detail/CVE-2021-30952"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-190"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Products", "due_date": "2026-03-26", "date_added": "2026-03-05", "vendorProject": "Apple", "vulnerabilityName": "Apple Multiple Products Integer Overflow or Wraparound Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2021-30952", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-30952"}]}, {"uuid": "dc62a36d-21c6-4503-8b81-134b27357f4f", "vulnerability": {"vulnId": "CVE-2023-43000", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "dc62a36d-21c6-4503-8b81-134b27357f4f"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-05T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-05T00:00:00Z", "recorded_at": "2026-03-05T20:00:01Z", "first_seen_at": "2026-03-05T00:00:00Z"}, "scope": {"notes": "KEV entry: Apple Multiple products Use-After-Free Vulnerability | Affected: Apple / Multiple Products | Description: Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-26 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://support.apple.com/en-us/120324 ; https://support.apple.com/en-us/120331 ; https://support.apple.com/en-us/120338 ; https://nvd.nist.gov/vuln/detail/CVE-2023-43000"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-416"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Products", "due_date": "2026-03-26", "date_added": "2026-03-05", "vendorProject": "Apple", "vulnerabilityName": "Apple Multiple products Use-After-Free Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2023-43000", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-43000"}]}, {"uuid": "e89d924d-ea2c-4157-aa07-c7d8d4f3bedd", "vulnerability": {"vulnId": "CVE-2021-22681", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "e89d924d-ea2c-4157-aa07-c7d8d4f3bedd"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-05T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-05T00:00:00Z", "recorded_at": "2026-03-05T20:00:01Z", "first_seen_at": "2026-03-05T00:00:00Z"}, "scope": {"notes": "KEV entry: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability | Affected: Rockwell / Multiple Products | Description: Multiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to be discovered. This key is used to verify Logix controllers are communicating with Rockwell Automation design software. If successfully exploited, this vulnerability could allow an unauthorized application to connect with Logix controllers. To leverage this vulnerability, an unauthorized user would require network access to the controller. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-26 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers- ; https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22681"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-522"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Products", "due_date": "2026-03-26", "date_added": "2026-03-05", "vendorProject": "Rockwell", "vulnerabilityName": "Rockwell Multiple Products Insufficient Protected Credentials Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2021-22681", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-22681"}]}, {"uuid": "f960c544-76a7-4e7c-bc81-86c051d18a48", "vulnerability": {"vulnId": "CVE-2017-7921", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "f960c544-76a7-4e7c-bc81-86c051d18a48"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-05T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-05T00:00:00Z", "recorded_at": "2026-03-05T20:00:01Z", "first_seen_at": "2026-03-05T00:00:00Z"}, "scope": {"notes": "KEV entry: Hikvision Multiple Products Improper Authentication Vulnerability | Affected: Hikvision / Multiple Products | Description: Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and gain access to sensitive information. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-26 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-7921"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-287"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Products", "due_date": "2026-03-26", "date_added": "2026-03-05", "vendorProject": "Hikvision", "vulnerabilityName": "Hikvision Multiple Products Improper Authentication Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2017-7921", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-7921"}]}, {"uuid": "cc5709ec-ce30-4f6c-9f18-19847e95f14d", "vulnerability": {"vulnId": "CVE-2026-21385", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "cc5709ec-ce30-4f6c-9f18-19847e95f14d"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-03T00:00:00Z", "recorded_at": "2026-03-03T18:00:01Z", "first_seen_at": "2026-03-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Qualcomm Multiple Chipsets Memory Corruption Vulnerability | Affected: Qualcomm / Multiple Chipsets | Description: Multiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation.  | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-24 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://source.android.com/docs/security/bulletin/2026/2026-03-01 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21385"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-190"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Chipsets", "due_date": "2026-03-24", "date_added": "2026-03-03", "vendorProject": "Qualcomm", "vulnerabilityName": "Qualcomm Multiple Chipsets Memory Corruption Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-21385", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-21385"}]}, {"uuid": "aaa01791-cd4c-4aa1-b538-d8efd3ce7ec0", "vulnerability": {"vulnId": "CVE-2026-22719", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "aaa01791-cd4c-4aa1-b538-d8efd3ce7ec0"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-03-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-03-03T00:00:00Z", "recorded_at": "2026-03-03T18:00:01Z", "first_seen_at": "2026-03-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Broadcom VMware Aria Operations Command Injection Vulnerability | Affected: Broadcom / VMware Aria Operations | Description: Broadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated attacker to execute arbitrary commands, potentially leading to remote code execution during support\u2011assisted product migration. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-24 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ; https://knowledge.broadcom.com/external/article/430349 ; https://nvd.nist.gov/vuln/detail/CVE-2026-22719"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-77"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "VMware Aria Operations", "due_date": "2026-03-24", "date_added": "2026-03-03", "vendorProject": "Broadcom", "vulnerabilityName": "Broadcom VMware Aria Operations Command Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-22719", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-22719"}]}, {"uuid": "a5459d11-d9a7-41bb-880f-57bfd0df2cd3", "vulnerability": {"vulnId": "CVE-2026-20127", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "a5459d11-d9a7-41bb-880f-57bfd0df2cd3"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-25T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-25T00:00:00Z", "recorded_at": "2026-02-25T17:00:01Z", "first_seen_at": "2026-02-25T00:00:00Z"}, "scope": {"notes": "KEV entry: Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability | Affected: Cisco / Catalyst SD-WAN Controller and Manager | Description: Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric. | Required action: Please adhere to CISA\u2019s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA\u2019s Emergency Directive 26-03 (URL listed below in Notes) and CISA\u2019s \u201cHunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Due date: 2026-02-27 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk ; https://nvd.nist.gov/vuln/detail/CVE-2026-20127"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-287"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Catalyst SD-WAN Controller and Manager", "due_date": "2026-02-27", "date_added": "2026-02-25", "vendorProject": "Cisco", "vulnerabilityName": "Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-20127", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-20127"}]}, {"uuid": "1b24d2be-5fd7-4dca-972f-32623981acca", "vulnerability": {"vulnId": "CVE-2022-20775", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "1b24d2be-5fd7-4dca-972f-32623981acca"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-25T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-25T00:00:00Z", "recorded_at": "2026-02-25T17:00:01Z", "first_seen_at": "2026-02-25T00:00:00Z"}, "scope": {"notes": "KEV entry: Cisco SD-WAN Path Traversal Vulnerability | Affected: Cisco / SD-WAN | Description: Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. | Required action: Please adhere to CISA\u2019s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA\u2019s Emergency Directive 26-03 (URL listed below in Notes) and CISA\u2019s \u201cHunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available. | Due date: 2026-02-27 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html ; https://nvd.nist.gov/vuln/detail/CVE-2022-20775"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-25", "CWE-282"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "SD-WAN", "due_date": "2026-02-27", "date_added": "2026-02-25", "vendorProject": "Cisco", "vulnerabilityName": "Cisco SD-WAN Path Traversal Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2022-20775", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-20775"}]}, {"uuid": "5e74c88c-56e4-4809-acd6-576312587845", "vulnerability": {"vulnId": "CVE-2026-25108", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "5e74c88c-56e4-4809-acd6-576312587845"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-24T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-24T00:00:00Z", "recorded_at": "2026-02-24T19:00:01Z", "first_seen_at": "2026-02-24T00:00:00Z"}, "scope": {"notes": "KEV entry: Soliton Systems K.K FileZen OS Command Injection Vulnerability | Affected: Soliton Systems K.K / FileZen | Description: Soliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP request. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-17 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://jvn.jp/en/jp/JVN84622767/ ; https://nvd.nist.gov/vuln/detail/CVE-2026-25108"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-78"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "FileZen", "due_date": "2026-03-17", "date_added": "2026-02-24", "vendorProject": "Soliton Systems K.K", "vulnerabilityName": "Soliton Systems K.K FileZen OS Command Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-25108", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-25108"}]}, {"uuid": "4fa17723-6c52-46a8-8de8-5dc05b9f7be9", "vulnerability": {"vulnId": "CVE-2025-68461", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "4fa17723-6c52-46a8-8de8-5dc05b9f7be9"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-20T00:00:00Z", "recorded_at": "2026-02-20T21:00:01Z", "first_seen_at": "2026-02-20T00:00:00Z"}, "scope": {"notes": "KEV entry: RoundCube Webmail Cross-site Scripting Vulnerability | Affected: Roundcube / Webmail | Description: RoundCube Webmail contains a cross-site scripting vulnerability via the animate tag in an SVG document. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-13 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://roundcube.net/news/2025/12/13/security-updates-1.6.12-and-1.5.12 ; https://github.com/roundcube/roundcubemail/commit/bfa032631c36b900e7444dfa278340b33cbf7cdb ; https://nvd.nist.gov/vuln/detail/CVE-2025-68461"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-79"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Webmail", "due_date": "2026-03-13", "date_added": "2026-02-20", "vendorProject": "Roundcube", "vulnerabilityName": "RoundCube Webmail Cross-site Scripting Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-68461", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-68461"}]}, {"uuid": "dfa4fdaf-857f-40b8-b8d4-f0aab9001ca2", "vulnerability": {"vulnId": "CVE-2025-49113", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "dfa4fdaf-857f-40b8-b8d4-f0aab9001ca2"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-20T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-20T00:00:00Z", "recorded_at": "2026-02-20T21:00:01Z", "first_seen_at": "2026-02-20T00:00:00Z"}, "scope": {"notes": "KEV entry: RoundCube Webmail Deserialization of Untrusted Data Vulnerability | Affected: Roundcube / Webmail | Description: RoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-13 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10 ; https://github.com/roundcube/roundcubemail/releases/tag/1.5.10 ; https://github.com/roundcube/roundcubemail/releases/tag/1.6.11 ; https://nvd.nist.gov/vuln/detail/CVE-2025-49113"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-502"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Webmail", "due_date": "2026-03-13", "date_added": "2026-02-20", "vendorProject": "Roundcube", "vulnerabilityName": "RoundCube Webmail Deserialization of Untrusted Data Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-49113", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-49113"}]}, {"uuid": "890f32d3-dc25-40d5-bce4-ea3fbd629d90", "vulnerability": {"vulnId": "CVE-2026-22769", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "890f32d3-dc25-40d5-bce4-ea3fbd629d90"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-18T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-18T00:00:00Z", "recorded_at": "2026-02-19T06:36:26Z", "first_seen_at": "2026-02-18T00:00:00Z"}, "scope": {"notes": "KEV entry: Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability | Affected: Dell / RecoverPoint for Virtual Machines (RP4VMs) | Description: Dell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-02-21 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079 ; https://www.dell.com/support/kbdoc/en-us/000426742/recoverpoint-for-vms-apply-the-remediation-script-for-dsa ; https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day ; https://nvd.nist.gov/vuln/detail/CVE-2026-22769"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-798"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "RecoverPoint for Virtual Machines (RP4VMs)", "due_date": "2026-02-21", "date_added": "2026-02-18", "vendorProject": "Dell", "vulnerabilityName": "Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-22769", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-22769"}]}, {"uuid": "42c4072c-d77b-4d70-886c-3162bcff5436", "vulnerability": {"vulnId": "CVE-2021-22175", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "42c4072c-d77b-4d70-886c-3162bcff5436"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-18T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-18T00:00:00Z", "recorded_at": "2026-02-19T06:36:26Z", "first_seen_at": "2026-02-18T00:00:00Z"}, "scope": {"notes": "KEV entry: GitLab Server-Side Request Forgery (SSRF) Vulnerability | Affected: GitLab / GitLab | Description: GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-11 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22175.json ; https://nvd.nist.gov/vuln/detail/CVE-2021-22175"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-918"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "GitLab", "due_date": "2026-03-11", "date_added": "2026-02-18", "vendorProject": "GitLab", "vulnerabilityName": "GitLab Server-Side Request Forgery (SSRF) Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2021-22175", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-22175"}]}, {"uuid": "e91192d0-f118-4bd7-8f87-2f3cfe055174", "vulnerability": {"vulnId": "CVE-2026-2441", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "e91192d0-f118-4bd7-8f87-2f3cfe055174"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-17T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-17T00:00:00Z", "recorded_at": "2026-02-18T06:44:47Z", "first_seen_at": "2026-02-17T00:00:00Z"}, "scope": {"notes": "KEV entry: Google Chromium CSS Use-After-Free Vulnerability | Affected: Google / Chromium | Description: Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-10 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-2441"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-416"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Chromium", "due_date": "2026-03-10", "date_added": "2026-02-17", "vendorProject": "Google", "vulnerabilityName": "Google Chromium CSS Use-After-Free Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-2441", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-2441"}]}, {"uuid": "e99710da-c001-46c3-8287-c62a2872b471", "vulnerability": {"vulnId": "CVE-2008-0015", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "e99710da-c001-46c3-8287-c62a2872b471"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-17T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-17T00:00:00Z", "recorded_at": "2026-02-18T06:44:47Z", "first_seen_at": "2026-02-17T00:00:00Z"}, "scope": {"notes": "KEV entry:  Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability | Affected: Microsoft / Windows | Description: Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-10 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://web.archive.org/web/20110305211119/https://www.microsoft.com/technet/security/bulletin/ms09-032.mspx ; https://nvd.nist.gov/vuln/detail/CVE-2008-0015"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": [], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Windows", "due_date": "2026-03-10", "date_added": "2026-02-17", "vendorProject": "Microsoft", "vulnerabilityName": " Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2008-0015", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2008-0015"}]}, {"uuid": "e74ada28-860b-4114-b8de-2b92690bd293", "vulnerability": {"vulnId": "CVE-2024-7694", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "e74ada28-860b-4114-b8de-2b92690bd293"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-17T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-17T00:00:00Z", "recorded_at": "2026-02-18T06:44:47Z", "first_seen_at": "2026-02-17T00:00:00Z"}, "scope": {"notes": "KEV entry: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability | Affected: TeamT5 / ThreatSonar Anti-Ransomware | Description: TeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system commands on the server. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-10 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://teamt5.org/en/posts/vulnerability-notice-threat-sonar-anti-ransomware-20240715/ ; https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-7694"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-434"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "ThreatSonar Anti-Ransomware", "due_date": "2026-03-10", "date_added": "2026-02-17", "vendorProject": "TeamT5", "vulnerabilityName": "TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-7694", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-7694"}]}, {"uuid": "c7226a32-0782-462c-a900-571b83aff201", "vulnerability": {"vulnId": "CVE-2020-7796", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "c7226a32-0782-462c-a900-571b83aff201"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-17T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-17T00:00:00Z", "recorded_at": "2026-02-18T06:44:47Z", "first_seen_at": "2026-02-17T00:00:00Z"}, "scope": {"notes": "KEV entry: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability | Affected: Synacor / Zimbra Collaboration Suite | Description: Synacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery vulnerability if WebEx zimlet installed and zimlet JSP is enabled. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-10 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 ; https://nvd.nist.gov/vuln/detail/CVE-2020-7796"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-918"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Zimbra Collaboration Suite", "due_date": "2026-03-10", "date_added": "2026-02-17", "vendorProject": "Synacor", "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2020-7796", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-7796"}]}, {"uuid": "ea74a512-7159-4004-bbbb-d76142a66067", "vulnerability": {"vulnId": "CVE-2026-1731", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "ea74a512-7159-4004-bbbb-d76142a66067"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-13T00:00:00Z", "recorded_at": "2026-02-16T17:38:42Z", "first_seen_at": "2026-02-13T00:00:00Z"}, "scope": {"notes": "KEV entry: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability | Affected: BeyondTrust / Remote Support (RS) and Privileged Remote Access (PRA) | Description: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user. Successful exploitation requires no authentication or user interaction and may lead to system compromise, including unauthorized access, data exfiltration, and service disruption. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-02-16 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): Please adhere to the vendor's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible BeyondTrust products affected by this vulnerability. For more information please: see: https://www.beyondtrust.com/trust-center/security-advisories/bt26-02 ; https://nvd.nist.gov/vuln/detail/CVE-2026-1731"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-78"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Remote Support (RS) and Privileged Remote Access (PRA)", "due_date": "2026-02-16", "date_added": "2026-02-13", "vendorProject": "BeyondTrust", "vulnerabilityName": "BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-1731", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-1731"}]}, {"uuid": "42dbd90c-65a6-4a4d-982a-739a54e46c36", "vulnerability": {"vulnId": "CVE-2025-40536", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "42dbd90c-65a6-4a4d-982a-739a54e46c36"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-12T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-12T00:00:00Z", "recorded_at": "2026-02-13T07:16:41Z", "first_seen_at": "2026-02-12T00:00:00Z"}, "scope": {"notes": "KEV entry: SolarWinds Web Help Desk Security Control Bypass Vulnerability | Affected: SolarWinds / Web Help Desk | Description: SolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-02-15 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm ; https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40536 ; https://nvd.nist.gov/vuln/detail/CVE-2025-40536"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-693"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Web Help Desk", "due_date": "2026-02-15", "date_added": "2026-02-12", "vendorProject": "SolarWinds", "vulnerabilityName": "SolarWinds Web Help Desk Security Control Bypass Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-40536", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-40536"}]}, {"uuid": "573978bc-369f-4db5-9b5b-5390d526048e", "vulnerability": {"vulnId": "CVE-2025-15556", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "573978bc-369f-4db5-9b5b-5390d526048e"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-12T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-12T00:00:00Z", "recorded_at": "2026-02-13T07:16:41Z", "first_seen_at": "2026-02-12T00:00:00Z"}, "scope": {"notes": "KEV entry: Notepad++ Download of Code Without Integrity Check Vulnerability | Affected: Notepad++ / Notepad++ | Description: Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-05 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://notepad-plus-plus.org/news/clarification-security-incident/ ; https://community.notepad-plus-plus.org/topic/27298/notepad-v8-8-9-vulnerability-fix ; https://nvd.nist.gov/vuln/detail/CVE-2025-15556"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-494"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Notepad++", "due_date": "2026-03-05", "date_added": "2026-02-12", "vendorProject": "Notepad++", "vulnerabilityName": "Notepad++ Download of Code Without Integrity Check Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-15556", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-15556"}]}, {"uuid": "99964c36-f8c7-4a2c-b303-572499b59b07", "vulnerability": {"vulnId": "CVE-2024-43468", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "99964c36-f8c7-4a2c-b303-572499b59b07"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-12T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-12T00:00:00Z", "recorded_at": "2026-02-13T07:16:41Z", "first_seen_at": "2026-02-12T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Configuration Manager SQL Injection Vulnerability | Affected: Microsoft / Configuration Manager | Description: Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-05 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43468"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-89"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Configuration Manager", "due_date": "2026-03-05", "date_added": "2026-02-12", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Configuration Manager SQL Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-43468", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-43468"}]}, {"uuid": "ba3aa680-812f-4c86-94aa-f470c6e29c33", "vulnerability": {"vulnId": "CVE-2026-20700", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "ba3aa680-812f-4c86-94aa-f470c6e29c33"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-12T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-12T00:00:00Z", "recorded_at": "2026-02-13T07:16:41Z", "first_seen_at": "2026-02-12T00:00:00Z"}, "scope": {"notes": "KEV entry: Apple Multiple Buffer Overflow Vulnerability | Affected: Apple / Multiple Products | Description: Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-05 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://support.apple.com/en-us/126346 ; https://support.apple.com/en-us/126348 ; https://support.apple.com/en-us/126351 ; https://support.apple.com/en-us/126352 ; https://support.apple.com/en-us/126353 ; https://nvd.nist.gov/vuln/detail/CVE-2026-20700"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-119"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Products", "due_date": "2026-03-05", "date_added": "2026-02-12", "vendorProject": "Apple", "vulnerabilityName": "Apple Multiple Buffer Overflow Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-20700", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-20700"}]}, {"uuid": "8278398a-6be9-41c8-a433-b4b49601a671", "vulnerability": {"vulnId": "CVE-2026-21514", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "8278398a-6be9-41c8-a433-b4b49601a671"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-10T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-10T00:00:00Z", "recorded_at": "2026-02-11T06:20:04Z", "first_seen_at": "2026-02-10T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability | Affected: Microsoft / Office | Description: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21514"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-807"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Office", "due_date": "2026-03-03", "date_added": "2026-02-10", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-21514", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-21514"}]}, {"uuid": "b9153fdd-e35a-4cea-8105-b6d603fb7e3c", "vulnerability": {"vulnId": "CVE-2026-21519", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "b9153fdd-e35a-4cea-8105-b6d603fb7e3c"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-10T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-10T00:00:00Z", "recorded_at": "2026-02-11T06:20:04Z", "first_seen_at": "2026-02-10T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Windows Type Confusion Vulnerability | Affected: Microsoft / Windows | Description: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21519"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-843"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Windows", "due_date": "2026-03-03", "date_added": "2026-02-10", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Windows Type Confusion Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-21519", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-21519"}]}, {"uuid": "31dcb6ec-881a-4b66-ab6e-bf25dd56f1d8", "vulnerability": {"vulnId": "CVE-2026-21533", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "31dcb6ec-881a-4b66-ab6e-bf25dd56f1d8"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-10T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-10T00:00:00Z", "recorded_at": "2026-02-11T06:20:04Z", "first_seen_at": "2026-02-10T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Windows Improper Privilege Management Vulnerability | Affected: Microsoft / Windows | Description: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21533"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-269"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Windows", "due_date": "2026-03-03", "date_added": "2026-02-10", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Windows Improper Privilege Management Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-21533", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-21533"}]}, {"uuid": "30aee3f3-1cae-45c1-84e5-0eb8d74f9d2d", "vulnerability": {"vulnId": "CVE-2026-21510", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "30aee3f3-1cae-45c1-84e5-0eb8d74f9d2d"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-10T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-10T00:00:00Z", "recorded_at": "2026-02-11T06:20:04Z", "first_seen_at": "2026-02-10T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Windows Shell Protection Mechanism Failure Vulnerability | Affected: Microsoft / Windows | Description: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.  | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21510 "}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-693"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Windows", "due_date": "2026-03-03", "date_added": "2026-02-10", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Windows Shell Protection Mechanism Failure Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-21510", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-21510"}]}, {"uuid": "cbf097d9-aa2b-4f5e-aa6f-858a9c601540", "vulnerability": {"vulnId": "CVE-2026-21525", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "cbf097d9-aa2b-4f5e-aa6f-858a9c601540"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-10T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-10T00:00:00Z", "recorded_at": "2026-02-11T06:20:04Z", "first_seen_at": "2026-02-10T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Windows NULL Pointer Dereference Vulnerability | Affected: Microsoft / Windows | Description: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21525"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-476"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Windows", "due_date": "2026-03-03", "date_added": "2026-02-10", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Windows NULL Pointer Dereference Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-21525", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-21525"}]}, {"uuid": "0f2343f8-cee7-4490-81c4-53db904cd11b", "vulnerability": {"vulnId": "CVE-2026-21513", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "0f2343f8-cee7-4490-81c4-53db904cd11b"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-10T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-10T00:00:00Z", "recorded_at": "2026-02-11T06:20:04Z", "first_seen_at": "2026-02-10T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability | Affected: Microsoft / Windows | Description: Microsoft MSHTML Framework contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-03-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2026-21513 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21513"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-693"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Windows", "due_date": "2026-03-03", "date_added": "2026-02-10", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2026-21513", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-21513"}]}, {"uuid": "019c7297-886c-48ea-9720-fb42efb38ec0", "vulnerability": {"vulnId": "CVE-2026-24423", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "019c7297-886c-48ea-9720-fb42efb38ec0"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-05T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-05T00:00:00Z", "recorded_at": "2026-02-06T07:53:17Z", "first_seen_at": "2026-02-05T00:00:00Z"}, "scope": {"notes": "KEV entry: SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability | Affected: SmarterTools / SmarterMail | Description: SmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution.  | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-02-26 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://www.smartertools.com/smartermail/release-notes/current ; https://www.cve.org/CVERecord?id=CVE-2026-24423 ; https://nvd.nist.gov/vuln/detail/CVE-2026-24423"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-306"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "SmarterMail", "due_date": "2026-02-26", "date_added": "2026-02-05", "vendorProject": "SmarterTools", "vulnerabilityName": "SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2026-24423", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-24423"}]}, {"uuid": "d167a1cc-cbbc-463b-84b9-adacc9a484b8", "vulnerability": {"vulnId": "CVE-2025-11953", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "d167a1cc-cbbc-463b-84b9-adacc9a484b8"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-05T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-05T00:00:00Z", "recorded_at": "2026-02-06T07:53:17Z", "first_seen_at": "2026-02-05T00:00:00Z"}, "scope": {"notes": "KEV entry: React Native Community CLI OS Command Injection Vulnerability | Affected: React Native Community / CLI | Description: React Native Community CLI contains an OS command injection vulnerability which could allow unauthenticated network attackers to send POST requests to the Metro Development Server and run arbitrary executables via a vulnerable endpoint exposed by the server. On Windows, attackers can also execute arbitrary shell commands with fully controlled arguments. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-02-26 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: ; https://github.com/react-native-community/cli/commit/15089907d1f1301b22c72d7f68846a2ef20df547;https://github.com/react-native-community/cli/pull/2735 ; https://nvd.nist.gov/vuln/detail/CVE-2025-11953"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-78"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "CLI", "due_date": "2026-02-26", "date_added": "2026-02-05", "vendorProject": "React Native Community", "vulnerabilityName": "React Native Community CLI OS Command Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-11953", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-11953"}]}, {"uuid": "357b0409-3c41-4b96-94eb-6dddcbe7ed40", "vulnerability": {"vulnId": "CVE-2025-40551", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "357b0409-3c41-4b96-94eb-6dddcbe7ed40"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-03T00:00:00Z", "recorded_at": "2026-02-04T08:30:33Z", "first_seen_at": "2026-02-03T00:00:00Z"}, "scope": {"notes": "KEV entry: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability | Affected: SolarWinds / Web Help Desk | Description: SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-02-06 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40551 ; https://nvd.nist.gov/vuln/detail/CVE-2025-40551"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-502"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Web Help Desk", "due_date": "2026-02-06", "date_added": "2026-02-03", "vendorProject": "SolarWinds", "vulnerabilityName": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-40551", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-40551"}]}, {"uuid": "00c53ba0-e8e9-4da1-806a-d8e5891feca5", "vulnerability": {"vulnId": "CVE-2019-19006", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "00c53ba0-e8e9-4da1-806a-d8e5891feca5"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-03T00:00:00Z", "recorded_at": "2026-02-04T08:30:33Z", "first_seen_at": "2026-02-03T00:00:00Z"}, "scope": {"notes": "KEV entry:  Sangoma FreePBX Improper Authentication Vulnerability | Affected: Sangoma / FreePBX | Description: Sangoma FreePBX contains an improper authentication vulnerability that potentially allows unauthorized users to bypass password authentication and access services provided by the FreePBX admin. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-02-24 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass ; https://nvd.nist.gov/vuln/detail/CVE-2019-19006"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-287"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "FreePBX", "due_date": "2026-02-24", "date_added": "2026-02-03", "vendorProject": "Sangoma", "vulnerabilityName": " Sangoma FreePBX Improper Authentication Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2019-19006", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-19006"}]}, {"uuid": "15ab3cbc-7f1a-4e28-90a4-5a2aac2ea75c", "vulnerability": {"vulnId": "CVE-2025-64328", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "15ab3cbc-7f1a-4e28-90a4-5a2aac2ea75c"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-03T00:00:00Z", "recorded_at": "2026-02-04T08:30:33Z", "first_seen_at": "2026-02-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Sangoma FreePBX OS Command Injection Vulnerability | Affected: Sangoma / FreePBX  | Description: Sangoma FreePBX Endpoint Manager contains an OS command injection vulnerability that could allow for a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to potentially obtain remote access to the system as an asterisk user.  | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-02-24 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw ; https://nvd.nist.gov/vuln/detail/CVE-2025-64328"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-78"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "FreePBX ", "due_date": "2026-02-24", "date_added": "2026-02-03", "vendorProject": "Sangoma", "vulnerabilityName": "Sangoma FreePBX OS Command Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2025-64328", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-64328"}]}, {"uuid": "f99f117a-1fe7-4bdf-acc5-ab3620661476", "vulnerability": {"vulnId": "CVE-2021-39935", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "f99f117a-1fe7-4bdf-acc5-ab3620661476"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2026-02-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2026-02-03T00:00:00Z", "recorded_at": "2026-02-04T08:30:33Z", "first_seen_at": "2026-02-03T00:00:00Z"}, "scope": {"notes": "KEV entry: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability | Affected: GitLab / Community and Enterprise Editions | Description: GitLab Community and Enterprise Editions contain a server-side request forgery vulnerability which could allow unauthorized external users to perform Server Side Requests via the CI Lint API.  | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2026-02-24 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-39935"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-918"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Community and Enterprise Editions", "due_date": "2026-02-24", "date_added": "2026-02-03", "vendorProject": "GitLab", "vulnerabilityName": "GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2021-39935", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-39935"}]}, {"uuid": "4304544c-d6c1-4f2b-9ff6-e092ff9ec066", "vulnerability": {"vulnId": "CVE-2020-29583", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "4304544c-d6c1-4f2b-9ff6-e092ff9ec066"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Zyxel Multiple Products Use of Hard-Coded Credentials Vulnerability | Affected: Zyxel / Multiple Products | Description: Zyxel firewalls (ATP, USG, VM) and AP Controllers (NXC2500 and NXC5500) contain a use of hard-coded credentials vulnerability in an undocumented account (\"zyfwp\") with an unchangeable password. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2020-29583"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-522"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Products", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "Zyxel", "vulnerabilityName": "Zyxel Multiple Products Use of Hard-Coded Credentials Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2020-29583", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-29583"}]}, {"uuid": "9edbf6f1-21d8-4734-bcb7-3bee0fdfbb75", "vulnerability": {"vulnId": "CVE-2019-8394", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "9edbf6f1-21d8-4734-bcb7-3bee0fdfbb75"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Zoho ManageEngine ServiceDesk Plus (SDP) File Upload Vulnerability | Affected: Zoho / ManageEngine | Description: Zoho ManageEngine ServiceDesk Plus (SDP) contains an unspecified vulnerability that allows remote users to upload files via login page customization. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2019-8394"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-434"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "ManageEngine", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "Zoho", "vulnerabilityName": "Zoho ManageEngine ServiceDesk Plus (SDP) File Upload Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2019-8394", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-8394"}]}, {"uuid": "b23da177-8084-48c0-a195-a2869168845a", "vulnerability": {"vulnId": "CVE-2020-10189", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "b23da177-8084-48c0-a195-a2869168845a"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Zoho ManageEngine Desktop Central File Upload Vulnerability | Affected: Zoho / ManageEngine | Description: Zoho ManageEngine Desktop Central contains a file upload vulnerability that allows for unauthenticated remote code execution. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2020-10189"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-502"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "ManageEngine", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "Zoho", "vulnerabilityName": "Zoho ManageEngine Desktop Central File Upload Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2020-10189", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-10189"}]}, {"uuid": "0cb335e0-bb7f-4bb6-9f86-e84813c95311", "vulnerability": {"vulnId": "CVE-2021-40539", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "0cb335e0-bb7f-4bb6-9f86-e84813c95311"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Zoho ManageEngine ADSelfService Plus Authentication Bypass Vulnerability | Affected: Zoho / ManageEngine | Description: Zoho ManageEngine ADSelfService Plus contains an authentication bypass vulnerability affecting the REST API URLs which allow for remote code execution. | Required action: Apply updates per vendor instructions. | Due date: 2021-11-17 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2021-40539"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-55"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "ManageEngine", "due_date": "2021-11-17", "date_added": "2021-11-03", "vendorProject": "Zoho", "vulnerabilityName": "Zoho ManageEngine ADSelfService Plus Authentication Bypass Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2021-40539", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-40539"}]}, {"uuid": "94e5a883-ae16-4b50-b003-c68c0358ed17", "vulnerability": {"vulnId": "CVE-2021-27561", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "94e5a883-ae16-4b50-b003-c68c0358ed17"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Yealink Device Management Server-Side Request Forgery (SSRF) Vulnerability | Affected: Yealink / Device Management | Description: Yealink Device Management contains a server-side request forgery (SSRF) vulnerability that allows for unauthenticated remote code execution. | Required action: Apply updates per vendor instructions. | Due date: 2021-11-17 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2021-27561"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-78"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Device Management", "due_date": "2021-11-17", "date_added": "2021-11-03", "vendorProject": "Yealink", "vulnerabilityName": "Yealink Device Management Server-Side Request Forgery (SSRF) Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2021-27561", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-27561"}]}, {"uuid": "3990d7d3-bfee-41a4-a4c1-527e352cb3ab", "vulnerability": {"vulnId": "CVE-2019-9978", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "3990d7d3-bfee-41a4-a4c1-527e352cb3ab"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: WordPress Social Warfare Plugin Cross-Site Scripting (XSS) Vulnerability | Affected: WordPress / Social Warfare Plugin | Description: WordPress Social Warfare plugin contains a cross-site scripting (XSS) vulnerability that allows for remote code execution. This vulnerability affects Social Warfare and Social Warfare Pro. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2019-9978"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-79"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Social Warfare Plugin", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "WordPress", "vulnerabilityName": "WordPress Social Warfare Plugin Cross-Site Scripting (XSS) Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2019-9978", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-9978"}]}, {"uuid": "68216d92-88ca-457d-9f8e-6aa38e87bd3b", "vulnerability": {"vulnId": "CVE-2020-11738", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "68216d92-88ca-457d-9f8e-6aa38e87bd3b"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: WordPress Snap Creek Duplicator Plugin File Download Vulnerability | Affected: WordPress / Snap Creek Duplicator Plugin | Description: WordPress Snap Creek Duplicator plugin contains a file download vulnerability when an administrator creates a new copy of their site that allows an attacker to download the generated files from their Wordpress dashboard. This vulnerability affects Duplicator and Dulplicator Pro. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2020-11738"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-22"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Snap Creek Duplicator Plugin", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "WordPress", "vulnerabilityName": "WordPress Snap Creek Duplicator Plugin File Download Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2020-11738", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-11738"}]}, {"uuid": "34f93f1e-dc9e-45f3-a75a-399bf27349e3", "vulnerability": {"vulnId": "CVE-2020-25213", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "34f93f1e-dc9e-45f3-a75a-399bf27349e3"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: WordPress File Manager Plugin Remote Code Execution Vulnerability | Affected: WordPress / File Manager Plugin | Description: WordPress File Manager plugin contains a remote code execution vulnerability that allows unauthenticated users to execute PHP code and upload malicious files on a target site. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2020-25213"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-434"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "File Manager Plugin", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "WordPress", "vulnerabilityName": "WordPress File Manager Plugin Remote Code Execution Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2020-25213", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-25213"}]}, {"uuid": "6cbb80ba-cf40-4f2c-a69a-7578d29462b1", "vulnerability": {"vulnId": "CVE-2020-4006", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "6cbb80ba-cf40-4f2c-a69a-7578d29462b1"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Multiple VMware Products Command Injection Vulnerability | Affected: VMware / Multiple Products | Description: VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector contain a command injection vulnerability. An attacker with network access to the administrative configurator on port 8443 and a valid password for the configurator administrator account can execute commands with unrestricted privileges on the underlying operating system. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2020-4006"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-78"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Products", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "VMware", "vulnerabilityName": "Multiple VMware Products Command Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2020-4006", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-4006"}]}, {"uuid": "91632daf-67f8-4c67-a589-8c92c4f30450", "vulnerability": {"vulnId": "CVE-2021-21985", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "91632daf-67f8-4c67-a589-8c92c4f30450"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: VMware vCenter Server Improper Input Validation Vulnerability | Affected: VMware / vCenter Server | Description: VMware vSphere Client contains an improper input validation vulnerability in the Virtual SAN Health Check plug-in, which is enabled by default in vCenter Server, which allows for remote code execution. | Required action: Apply updates per vendor instructions. | Due date: 2021-11-17 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2021-21985"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-20", "CWE-470", "CWE-918"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "vCenter Server", "due_date": "2021-11-17", "date_added": "2021-11-03", "vendorProject": "VMware", "vulnerabilityName": "VMware vCenter Server Improper Input Validation Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2021-21985", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-21985"}]}, {"uuid": "49487080-dc97-4447-83ce-0f52fd3b3d63", "vulnerability": {"vulnId": "CVE-2021-21972", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "49487080-dc97-4447-83ce-0f52fd3b3d63"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: VMware vCenter Server Remote Code Execution Vulnerability | Affected: VMware / vCenter Server | Description: VMware vCenter Server vSphere Client contains a remote code execution vulnerability in a vCenter Server plugin which allows an attacker with network access to port 443 to execute commands with unrestricted privileges on the underlying operating system. | Required action: Apply updates per vendor instructions. | Due date: 2021-11-17 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2021-21972"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-23"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "vCenter Server", "due_date": "2021-11-17", "date_added": "2021-11-03", "vendorProject": "VMware", "vulnerabilityName": "VMware vCenter Server Remote Code Execution Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2021-21972", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-21972"}]}, {"uuid": "886049b8-01af-4357-862e-0ffa4c56766b", "vulnerability": {"vulnId": "CVE-2020-3952", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "886049b8-01af-4357-862e-0ffa4c56766b"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: VMware vCenter Server Information Disclosure Vulnerability | Affected: VMware / vCenter Server | Description: VMware vCenter Server contains an information disclosure vulnerability in the VMware Directory Service (vmdir) when the Platform Services Controller (PSC) does not correctly implement access controls. Successful exploitation allows an attacker with network access to port 389 to extract sensitive information. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2020-3952"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-306"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "vCenter Server", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "VMware", "vulnerabilityName": "VMware vCenter Server Information Disclosure Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2020-3952", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-3952"}]}, {"uuid": "5ffe2e25-86b3-4640-a6a4-4e3958624da5", "vulnerability": {"vulnId": "CVE-2021-22005", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "5ffe2e25-86b3-4640-a6a4-4e3958624da5"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: VMware vCenter Server File Upload Vulnerability | Affected: VMware / vCenter Server | Description: VMware vCenter Server contains a file upload vulnerability in the Analytics service that allows a user with network access to port 443 to execute code. | Required action: Apply updates per vendor instructions. | Due date: 2021-11-17 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2021-22005"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-23"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "vCenter Server", "due_date": "2021-11-17", "date_added": "2021-11-03", "vendorProject": "VMware", "vulnerabilityName": "VMware vCenter Server File Upload Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2021-22005", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-22005"}]}, {"uuid": "2984401c-9010-4912-97b7-fea6870ec8b2", "vulnerability": {"vulnId": "CVE-2020-3950", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "2984401c-9010-4912-97b7-fea6870ec8b2"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: VMware Multiple Products Privilege Escalation Vulnerability | Affected: VMware / Multiple Products | Description: VMware Fusion, Remote Console (VMRC) for Mac, and Horizon Client for Mac contain a privilege escalation vulnerability due to improper use of setuid binaries that allows attackers to escalate privileges to root. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2020-3950"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-269"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Multiple Products", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "VMware", "vulnerabilityName": "VMware Multiple Products Privilege Escalation Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2020-3950", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-3950"}]}, {"uuid": "906f312b-9274-496d-8aa8-a6627e12c59c", "vulnerability": {"vulnId": "CVE-2020-3992", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "906f312b-9274-496d-8aa8-a6627e12c59c"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: VMware ESXi OpenSLP Use-After-Free Vulnerability | Affected: VMware / ESXi | Description: VMware ESXi OpenSLP contains a use-after-free vulnerability that allows an attacker residing in the management network with access to port 427 to perform remote code execution. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2020-3992"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-416"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "ESXi", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "VMware", "vulnerabilityName": "VMware ESXi OpenSLP Use-After-Free Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2020-3992", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-3992"}]}, {"uuid": "37a58127-f879-4cbe-a8d1-205df208c6e0", "vulnerability": {"vulnId": "CVE-2019-5544", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "37a58127-f879-4cbe-a8d1-205df208c6e0"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: VMware ESXi and Horizon DaaS OpenSLP Heap-Based Buffer Overflow Vulnerability | Affected: VMware / VMware ESXi and Horizon DaaS | Description: VMware ESXi and Horizon Desktop as a Service (DaaS) OpenSLP contains a heap-based buffer overflow vulnerability that allows an attacker with network access to port 427 to overwrite the heap of the OpenSLP service to perform remote code execution. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2019-5544"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-787"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "VMware ESXi and Horizon DaaS", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "VMware", "vulnerabilityName": "VMware ESXi and Horizon DaaS OpenSLP Heap-Based Buffer Overflow Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2019-5544", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-5544"}]}, {"uuid": "6d09cfe5-6de5-40fb-af93-3b040e46f4c9", "vulnerability": {"vulnId": "CVE-2020-17496", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "6d09cfe5-6de5-40fb-af93-3b040e46f4c9"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: vBulletin PHP Module Remote Code Execution Vulnerability | Affected: vBulletin / vBulletin | Description: The PHP module within vBulletin contains an unspecified vulnerability that allows for remote code execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. This CVE ID resolves an incomplete patch for CVE-2019-16759. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2020-17496"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-74"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "vBulletin", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "vBulletin", "vulnerabilityName": "vBulletin PHP Module Remote Code Execution Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2020-17496", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-17496"}]}, {"uuid": "ccc5c35a-86cf-4ede-b06a-0f0838710392", "vulnerability": {"vulnId": "CVE-2019-16759", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "ccc5c35a-86cf-4ede-b06a-0f0838710392"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: vBulletin PHP Module Remote Code Execution Vulnerability | Affected: vBulletin / vBulletin | Description: The PHP module within vBulletin contains an unspecified vulnerability that allows for remote code execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2019-16759"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-94"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "vBulletin", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "vBulletin", "vulnerabilityName": "vBulletin PHP Module Remote Code Execution Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2019-16759", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-16759"}]}]}
