Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Highlights New Security Flaws, Sets 2026 Deadline

CISA Highlights New Security Flaws, Sets 2026 Deadline

Posted on April 25, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) catalog, adding four significant vulnerabilities. These flaws are found in SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers, all of which are currently subject to active exploitation. In light of this, federal agencies are required to address these vulnerabilities by May 8, 2026.

Details of the Newly Added Vulnerabilities

The vulnerabilities identified include CVE-2024-57726, a critical flaw in SimpleHelp with a CVSS score of 9.9. This missing authorization issue enables technicians with limited privileges to generate API keys with excessive permissions, potentially allowing them to elevate their access to server admin roles.

Another vulnerability, CVE-2024-57728, affects SimpleHelp as well. With a CVSS score of 7.2, it involves a path traversal issue where admin users can upload files arbitrarily across the system by using a specially crafted zip file, leading to arbitrary code execution.

CVE-2024-7399, impacting Samsung MagicINFO 9 Server, is a path traversal vulnerability that allows attackers to write files with system authority. Additionally, CVE-2025-29635 in D-Link DIR-823X routers is a command injection flaw that permits authorized users to execute unauthorized commands remotely.

Potential Impacts and Ongoing Exploits

The SimpleHelp vulnerabilities have been flagged as potential precursors to ransomware attacks, although their specific use in such campaigns remains unclear. However, reports from cybersecurity firms such as Field Effect and Sophos indicate their exploitation in ransomware operations, notably by the group known as DragonForce.

The Samsung MagicINFO vulnerability has been associated with the deployment of the Mirai botnet, a notorious malware strain. Akamai has reported attempts to exploit the D-Link vulnerability to distribute a Mirai variant named ‘tuxnokill’.

Mandatory Actions for Federal Agencies

To mitigate these risks, the Federal Civilian Executive Branch (FCEB) agencies must promptly apply security patches. In the case of the D-Link vulnerability, they should cease using the affected routers entirely by the specified deadline in May 2026.

CISA’s directive underscores the critical importance of proactive cybersecurity measures to safeguard against increasingly sophisticated threats. As cyber adversaries continue to exploit known weaknesses, staying ahead with timely updates and strategic defenses will be vital for national security.

The Hacker News Tags:CISA, Cybersecurity, D-Link routers, DragonForce, exploited vulnerabilities, infrastructure security, Mirai botnet, network security, Ransomware, Samsung MagicINFO, SimpleHelp

Post navigation

Previous Post: Hackers Target Cisco Devices with Known Vulnerabilities

Related Posts

SEC Files Charges Over  Million Crypto Scam Using Fake AI-Themed Investment Tips SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips The Hacker News
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks The Hacker News
New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks The Hacker News
A Pragmatic Approach To NHI Inventories  A Pragmatic Approach To NHI Inventories  The Hacker News
Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do The Hacker News
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Highlights New Security Flaws, Sets 2026 Deadline
  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks
  • Ollama Vulnerability Exposes Servers to Data Leaks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Highlights New Security Flaws, Sets 2026 Deadline
  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks
  • Ollama Vulnerability Exposes Servers to Data Leaks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark