Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Alerts on Zimbra, SharePoint Vulnerabilities

CISA Alerts on Zimbra, SharePoint Vulnerabilities

Posted on March 19, 2026 By CWS

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to government entities regarding two significant security vulnerabilities in the Synacor Zimbra Collaboration Suite (ZCS) and Microsoft Office SharePoint. These flaws, which have been actively exploited, necessitate immediate action to apply the available patches.

Zimbra and SharePoint Security Flaws

The specific vulnerabilities identified by CISA include CVE-2025-66376 and CVE-2026-20963. The ZCS flaw (CVE-2025-66376) is a stored cross-site scripting issue with a CVSS score of 7.2, where attackers can exploit Cascading Style Sheets (CSS) in HTML emails. This flaw was addressed in November 2025 with updates to versions 10.0.18 and 10.1.13. Meanwhile, SharePoint’s vulnerability (CVE-2026-20963) involves the deserialization of untrusted data, allowing unauthorized code execution over networks, boasting a CVSS score of 8.8. This issue was resolved in January 2026.

Patch Recommendations and Exploit Details

Currently, there are no detailed public reports on the extent or specific actors exploiting these vulnerabilities. Nevertheless, due to their active exploitation, CISA advises Federal Civilian Executive Branch (FCEB) agencies to apply the patch for CVE-2025-66376 by April 1, 2026, and for CVE-2026-20963 by March 23, 2026. Prompt action is crucial to mitigate potential risks.

Cisco Zero-Day Exploited in Ransomware Attacks

In a related development, Amazon has disclosed that a critical vulnerability in Cisco’s firewall management software (CVE-2026-20131) has been targeted by Interlock ransomware groups. This flaw, with a maximum CVSS score of 10.0, was exploited starting January 26, 2026, before its public disclosure. This ransomware group is known for targeting sectors like education, engineering, and healthcare to maximize disruption and pressure for ransom payments.

The exploitation of CVE-2026-20131 exemplifies a broader trend where threat actors focus on network edge devices from vendors like Cisco and Fortinet to gain initial access. This incident underscores the need for vigilance in securing network infrastructure against zero-day attacks that leverage undisclosed vulnerabilities.

Concluding Insights

The recent string of exploits serves as a stark reminder of the evolving tactics employed by cyber adversaries. Organizations must remain proactive in applying security patches and monitoring their systems for potential breaches. Staying informed and prepared is vital to safeguarding against increasingly sophisticated cyber threats.

The Hacker News Tags:CISA, Cybersecurity, Exploits, network security, Patches, Ransomware, Security, SharePoint, Vulnerabilities, Zimbra

Post navigation

Previous Post: SnappyClient Malware Threatens Windows with Stealthy Data Breaches
Next Post: WaterPlum’s New Malware Threatens VSCode Security

Related Posts

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services The Hacker News
Why Offensive Security Training Benefits Your Entire Security Team Why Offensive Security Training Benefits Your Entire Security Team The Hacker News
WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware The Hacker News
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia The Hacker News
1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub The Hacker News
Critical RCE Bug Rated 9.9 CVSS in Backup & Replication Critical RCE Bug Rated 9.9 CVSS in Backup & Replication The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Defender Misidentifies DigiCert Certificates
  • Pentagon Partners with Tech Giants for AI in Defense
  • CISA Highlights Critical Linux Vulnerability Exploitation
  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Defender Misidentifies DigiCert Certificates
  • Pentagon Partners with Tech Giants for AI in Defense
  • CISA Highlights Critical Linux Vulnerability Exploitation
  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark