Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Highlights Six Exploited Flaws in Major Software

CISA Highlights Six Exploited Flaws in Major Software

Posted on April 14, 2026 By CWS

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog by adding six new security vulnerabilities. This update, announced on Monday, highlights evidence of active exploitation and urges relevant agencies to address these issues promptly.

Details on Newly Added Vulnerabilities

The vulnerabilities, affecting software from Fortinet, Microsoft, and Adobe, present significant risks. Among them is CVE-2026-21643, a severe SQL injection flaw in Fortinet FortiClient EMS with a CVSS score of 9.1. This vulnerability allows unauthorized code execution through crafted HTTP requests.

Adobe Acrobat Reader is impacted by CVE-2020-9715, a use-after-free vulnerability permitting remote code execution. Microsoft software is affected by several vulnerabilities: CVE-2023-36424 in Windows Common Log File System Driver, leading to privilege escalation, and CVE-2023-21529, a deserialization issue in Exchange Server that can enable remote code execution by authenticated users.

Additionally, CVE-2025-60710 involves an improper link resolution in Windows Tasks, which can elevate local privileges, while CVE-2012-1854 in Visual Basic for Applications poses a risk of remote code execution due to insecure library loading.

Evidence of Active Exploitation

Defused Cyber reported attempts to exploit CVE-2026-21643 beginning March 24, 2026. Meanwhile, Microsoft disclosed that the threat actor Storm-1175 is leveraging CVE-2023-21529 to deploy Medusa ransomware. Historical advisories from Microsoft, dating back to July 2012, noted limited attacks utilizing CVE-2012-1854, though details remain sparse.

No public records currently indicate the exploitation of the other listed vulnerabilities. However, the active exploitation of some flaws underscores the urgency of applying security patches.

Mandated Actions for Federal Agencies

In response to these threats, Federal Civilian Executive Branch (FCEB) agencies are mandated to implement the necessary patches by April 27, 2026. This directive aims to mitigate potential risks associated with these vulnerabilities.

The update to the KEV catalog serves as a crucial reminder of the evolving landscape of cybersecurity threats. Continuous vigilance and timely action are essential to safeguard systems from exploitation.

As software vulnerabilities continue to pose significant security challenges, agencies and organizations must prioritize patch management and system updates to protect their infrastructure.

The Hacker News Tags:Adobe, CISA, Cybersecurity, exploited flaws, Fortinet, KEV catalog, Microsoft, network security, software flaws, Vulnerabilities

Post navigation

Previous Post: ShowDoc Vulnerability CVE-2025-0520 Exploited in the Wild
Next Post: Malicious Chrome Extensions Target Google and Telegram Data

Related Posts

Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub The Hacker News
LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets The Hacker News
Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups The Hacker News
Your First and Last Line of Defense Your First and Last Line of Defense The Hacker News
MS Teams Hack, MFA Hijacking, B Crypto Heist, Apple Siri Probe & More MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More The Hacker News
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SAP Mitigates Severe ABAP Security Flaw
  • Mirax Android RAT Exploits Devices as Proxies via Meta Ads
  • FBI and Indonesian Police Dismantle Global Phishing Network
  • Triad Nexus Maneuvers Around Sanctions to Sustain Cybercrime
  • Critical Security Risks Skyrocket: OX Security’s 2026 Analysis

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SAP Mitigates Severe ABAP Security Flaw
  • Mirax Android RAT Exploits Devices as Proxies via Meta Ads
  • FBI and Indonesian Police Dismantle Global Phishing Network
  • Triad Nexus Maneuvers Around Sanctions to Sustain Cybercrime
  • Critical Security Risks Skyrocket: OX Security’s 2026 Analysis

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark