Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Identifies Critical Flaws in ConnectWise and Windows

CISA Identifies Critical Flaws in ConnectWise and Windows

Posted on April 29, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently highlighted two significant security vulnerabilities impacting ConnectWise ScreenConnect and Microsoft Windows by adding them to its Known Exploited Vulnerabilities (KEV) catalog. This decision comes in response to confirmed instances of active exploitation.

Details of the Vulnerabilities

The first vulnerability, identified as CVE-2024-1708, has a CVSS score of 8.4 and involves a path traversal issue in ConnectWise ScreenConnect. This flaw could potentially allow malicious actors to execute remote code or access sensitive data and critical systems. It was rectified in February 2024. The second vulnerability, CVE-2026-32202, which affects the Microsoft Windows Shell, has a CVSS score of 4.3. This security gap could enable unauthorized individuals to carry out network-based spoofing attacks and was patched as of April 2026.

Exploitation and Impact

Microsoft’s update of its advisory on CVE-2026-32202 acknowledged the flaw’s active exploitation shortly before its inclusion in the KEV catalog. Although specific attack methodologies remain undisclosed, Akamai reported that the vulnerability resulted from an incomplete patch for CVE-2026-21510, previously exploited alongside CVE-2026-21513 by the Russian hacking group APT28. This group has targeted Ukraine and European Union nations since late 2025.

In contrast, CVE-2024-1708 has been exploited in conjunction with CVE-2024-1709, a critical authentication bypass flaw rated with a CVSS score of 10.0. Microsoft has identified a China-based threat actor, known as Storm-1175, as being responsible for leveraging these vulnerabilities to deploy the Medusa ransomware.

Response and Mitigation

CVE-2024-1709 was previously added to the KEV catalog by CISA on February 22, 2024. In response, the Federal Civilian Executive Branch (FCEB) agencies are mandated to implement necessary security updates by May 12, 2026, to fortify their network defenses against potential threats.

These developments underscore the critical need for organizations to maintain up-to-date security measures and swiftly apply patches to protect their systems from exploitation. Staying informed about emerging vulnerabilities and taking proactive steps to mitigate risks are essential components of effective cybersecurity strategies.

Looking ahead, the focus remains on enhancing collaborative efforts between agencies and the private sector to prevent and respond to cybersecurity threats effectively, ensuring the protection of sensitive information and infrastructure.

The Hacker News Tags:APT28, CISA, ConnectWise, CVE, Cybersecurity, Exploits, FCEB, KEV, Medusa ransomware, network security, Patches, Security, Storm-1175, Vulnerabilities, Windows

Post navigation

Previous Post: cPanel Issues Urgent Fix for Critical Security Flaw
Next Post: Chrome and Firefox Release Crucial Security Updates

Related Posts

New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login The Hacker News
NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More The Hacker News
What the 2025 Gartner® Magic Quadrant™ Reveals What the 2025 Gartner® Magic Quadrant™ Reveals The Hacker News
New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data The Hacker News
CISA Highlights New Security Flaws, Sets 2026 Deadline CISA Highlights New Security Flaws, Sets 2026 Deadline The Hacker News
300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide 300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LofyStealer Targets Minecraft Players with Advanced Tactics
  • Checkmarx Supply Chain Attack Leads to Data Breach
  • Update Your cPanel Server to Fix Critical Vulnerability
  • VECT 2.0 Ransomware: A Destructive Threat to Data
  • Iranian Group Handala Threatens US Troops in Bahrain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LofyStealer Targets Minecraft Players with Advanced Tactics
  • Checkmarx Supply Chain Attack Leads to Data Breach
  • Update Your cPanel Server to Fix Critical Vulnerability
  • VECT 2.0 Ransomware: A Destructive Threat to Data
  • Iranian Group Handala Threatens US Troops in Bahrain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark