CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读文章,抓住主要信息。 文章主要讲的是美国网络安全和基础设施安全局(CISA)新增了8个已知被利用的漏洞到他们的目录中。其中有三个漏洞影响的是Cisco Catalyst SD-WAN Manager。其他漏洞涉及PaperCut、JetBrains TeamCity、Kentico Xperience、Quest KACE SMA、Synacor Zimbra等产品。每个漏洞都有CVSS评分,评分从5.4到10.0不等,说明这些漏洞的风险等级较高。 文章还提到一些漏洞已经被积极利用的情况,比如CVE-2023-27351被Lace Tempest用于攻击,CVE-2025-32975被未知威胁者利用。CISA建议联邦机构在特定日期前修复这些漏洞。 总结的时候,我需要涵盖CISA新增了8个漏洞,其中三个影响Cisco SD-WAN Manager,其他涉及多个产品,并且有活跃的攻击案例。最后提到修复建议。 现在把这些信息浓缩到100字以内,确保语言简洁明了。 </think> 美国网络安全机构CISA新增8个已知被利用的漏洞至目录,其中3个影响Cisco Catalyst SD-WAN Manager。其余漏洞涉及PaperCut、JetBrains TeamCity、Kentico Xperience、Quest KACE SMA和Synacor Zimbra等产品。部分漏洞已被活跃利用,CISA建议相关机构在指定日期前修复以应对威胁。 2026-4-21 06:23:0 Author: thehackernews.com(查看原文) 阅读量:12 收藏

Network Security / Threat Intelligence

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including three flaws impacting Cisco Catalyst SD-WAN Manager, citing evidence of active exploitation.

The list of vulnerabilities is as follows -

  • CVE-2023-27351 (CVSS score: 8.2) - An improper authentication vulnerability in PaperCut NG/MF that could allow an attacker to bypass authentication on affected installations via the SecurityRequestFilter class.
  • CVE-2024-27199 (CVSS score: 7.3) - A relative path traversal vulnerability in JetBrains TeamCity that could allow an attacker to perform limited admin actions.
  • CVE-2025-2749 (CVSS score: 7.2) - A path traversal vulnerability in Kentico Xperience that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations.
  • CVE-2025-32975 (CVSS score: 10.0) - An improper authentication vulnerability in Quest KACE Systems Management Appliance (SMA) that could allow an attacker to impersonate legitimate users without valid credentials. 
  • CVE-2025-48700 (CVSS score: 6.1) - A cross-site scripting vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that could allow an attacker to execute arbitrary JavaScript within the user's session, resulting in unauthorized access to sensitive information.
  • CVE-2026-20122 (CVSS score: 5.4) - An incorrect use of privileged APIs vulnerability in Cisco Catalyst SD-WAN Manager that could allow an attacker to upload and overwrite arbitrary files on the affected system and gain vmanage user privileges.
  • CVE-2026-20128 (CVSS score: 7.5) - A storing passwords in a recoverable format vulnerability in Cisco Catalyst SD-WAN Manager that could allow an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user.
  • CVE-2026-20133 (CVSS score: 6.5) - An exposure of sensitive information to an unauthorized actor vulnerability in Cisco Catalyst SD-WAN Manager that could allow remote attackers to view sensitive information on affected systems.

It's worth noting that CISA added CVE-2024-27198, another flaw impacting on-premise versions of JetBrains TeamCity, to the KEV catalog in March 2024. It's not known at this stage if both vulnerabilities are being exploited together and if the activity is the work of the same threat actor.

The exploitation of CVE-2023-27351, on the other hand, was attributed to Lace Tempest in April 2023 in connection with attacks delivering Cl0p and LockBit ransomware families.

As for CVE-2025-32975, Arctic Wolf said it observed unknown threat actors weaponizing the bug to target unpatched SMA systems as late last month, although the exact end goals of the campaign remain unknown.

Cisco, for its part, also said it became aware of the exploitation of CVE-2026-20122 and CVE-2026-20128 in March 2026. The company has yet to revise its advisory to reflect the in-the-wild abuse of CVE-2026-20133.

In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies have been recommended to address the three Cisco vulnerabilities by April 23, 2026, and the rest by May 4, 2026.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html
如有侵权请联系:admin#unsafe.sh