Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Identifies Critical Flaws in ConnectWise and Windows

CISA Identifies Critical Flaws in ConnectWise and Windows

Posted on April 29, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently highlighted two significant security vulnerabilities impacting ConnectWise ScreenConnect and Microsoft Windows by adding them to its Known Exploited Vulnerabilities (KEV) catalog. This decision comes in response to confirmed instances of active exploitation.

Details of the Vulnerabilities

The first vulnerability, identified as CVE-2024-1708, has a CVSS score of 8.4 and involves a path traversal issue in ConnectWise ScreenConnect. This flaw could potentially allow malicious actors to execute remote code or access sensitive data and critical systems. It was rectified in February 2024. The second vulnerability, CVE-2026-32202, which affects the Microsoft Windows Shell, has a CVSS score of 4.3. This security gap could enable unauthorized individuals to carry out network-based spoofing attacks and was patched as of April 2026.

Exploitation and Impact

Microsoft’s update of its advisory on CVE-2026-32202 acknowledged the flaw’s active exploitation shortly before its inclusion in the KEV catalog. Although specific attack methodologies remain undisclosed, Akamai reported that the vulnerability resulted from an incomplete patch for CVE-2026-21510, previously exploited alongside CVE-2026-21513 by the Russian hacking group APT28. This group has targeted Ukraine and European Union nations since late 2025.

In contrast, CVE-2024-1708 has been exploited in conjunction with CVE-2024-1709, a critical authentication bypass flaw rated with a CVSS score of 10.0. Microsoft has identified a China-based threat actor, known as Storm-1175, as being responsible for leveraging these vulnerabilities to deploy the Medusa ransomware.

Response and Mitigation

CVE-2024-1709 was previously added to the KEV catalog by CISA on February 22, 2024. In response, the Federal Civilian Executive Branch (FCEB) agencies are mandated to implement necessary security updates by May 12, 2026, to fortify their network defenses against potential threats.

These developments underscore the critical need for organizations to maintain up-to-date security measures and swiftly apply patches to protect their systems from exploitation. Staying informed about emerging vulnerabilities and taking proactive steps to mitigate risks are essential components of effective cybersecurity strategies.

Looking ahead, the focus remains on enhancing collaborative efforts between agencies and the private sector to prevent and respond to cybersecurity threats effectively, ensuring the protection of sensitive information and infrastructure.

The Hacker News Tags:APT28, CISA, ConnectWise, CVE, Cybersecurity, Exploits, FCEB, KEV, Medusa ransomware, network security, Patches, Security, Storm-1175, Vulnerabilities, Windows

Post navigation

Previous Post: cPanel Issues Urgent Fix for Critical Security Flaw
Next Post: Chrome and Firefox Release Crucial Security Updates

Related Posts

RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories The Hacker News
New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT The Hacker News
That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat The Hacker News
Agentic AI Revolutionizes Security Validation Agentic AI Revolutionizes Security Validation The Hacker News
Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns The Hacker News
China-Linked DKnife Framework Exploits Routers for Attacks China-Linked DKnife Framework Exploits Routers for Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Group Handala Threatens US Troops in Bahrain
  • Vect 2.0 RaaS Threatens Global Cybersecurity
  • Chrome and Firefox Release Crucial Security Updates
  • CISA Identifies Critical Flaws in ConnectWise and Windows
  • cPanel Issues Urgent Fix for Critical Security Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Group Handala Threatens US Troops in Bahrain
  • Vect 2.0 RaaS Threatens Global Cybersecurity
  • Chrome and Firefox Release Crucial Security Updates
  • CISA Identifies Critical Flaws in ConnectWise and Windows
  • cPanel Issues Urgent Fix for Critical Security Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark