Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Highlights Six Exploited Flaws in Major Software

CISA Highlights Six Exploited Flaws in Major Software

Posted on April 14, 2026 By CWS

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog by adding six new security vulnerabilities. This update, announced on Monday, highlights evidence of active exploitation and urges relevant agencies to address these issues promptly.

Details on Newly Added Vulnerabilities

The vulnerabilities, affecting software from Fortinet, Microsoft, and Adobe, present significant risks. Among them is CVE-2026-21643, a severe SQL injection flaw in Fortinet FortiClient EMS with a CVSS score of 9.1. This vulnerability allows unauthorized code execution through crafted HTTP requests.

Adobe Acrobat Reader is impacted by CVE-2020-9715, a use-after-free vulnerability permitting remote code execution. Microsoft software is affected by several vulnerabilities: CVE-2023-36424 in Windows Common Log File System Driver, leading to privilege escalation, and CVE-2023-21529, a deserialization issue in Exchange Server that can enable remote code execution by authenticated users.

Additionally, CVE-2025-60710 involves an improper link resolution in Windows Tasks, which can elevate local privileges, while CVE-2012-1854 in Visual Basic for Applications poses a risk of remote code execution due to insecure library loading.

Evidence of Active Exploitation

Defused Cyber reported attempts to exploit CVE-2026-21643 beginning March 24, 2026. Meanwhile, Microsoft disclosed that the threat actor Storm-1175 is leveraging CVE-2023-21529 to deploy Medusa ransomware. Historical advisories from Microsoft, dating back to July 2012, noted limited attacks utilizing CVE-2012-1854, though details remain sparse.

No public records currently indicate the exploitation of the other listed vulnerabilities. However, the active exploitation of some flaws underscores the urgency of applying security patches.

Mandated Actions for Federal Agencies

In response to these threats, Federal Civilian Executive Branch (FCEB) agencies are mandated to implement the necessary patches by April 27, 2026. This directive aims to mitigate potential risks associated with these vulnerabilities.

The update to the KEV catalog serves as a crucial reminder of the evolving landscape of cybersecurity threats. Continuous vigilance and timely action are essential to safeguard systems from exploitation.

As software vulnerabilities continue to pose significant security challenges, agencies and organizations must prioritize patch management and system updates to protect their infrastructure.

The Hacker News Tags:Adobe, CISA, Cybersecurity, exploited flaws, Fortinet, KEV catalog, Microsoft, network security, software flaws, Vulnerabilities

Post navigation

Previous Post: ShowDoc Vulnerability CVE-2025-0520 Exploited in the Wild
Next Post: Malicious Chrome Extensions Target Google and Telegram Data

Related Posts

Kickstart Your Intelligent Workflow Program with 3 Key Strategies Kickstart Your Intelligent Workflow Program with 3 Key Strategies The Hacker News
ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach The Hacker News
China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones The Hacker News
Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App The Hacker News
Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data The Hacker News
TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Enhances Pixel Security with Rust DNS Parser
  • Google Integrates Rust DNS Parser in Pixel 10 for Security
  • CISA Urges Action on Fortinet SQL Injection Flaw
  • Data Breach Affects 1 Million Members at Europe’s Top Gym
  • PlugX USB Worm Exploits DLL Sideloading Globally

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Enhances Pixel Security with Rust DNS Parser
  • Google Integrates Rust DNS Parser in Pixel 10 for Security
  • CISA Urges Action on Fortinet SQL Injection Flaw
  • Data Breach Affects 1 Million Members at Europe’s Top Gym
  • PlugX USB Worm Exploits DLL Sideloading Globally

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark