
CISA Adds Five Bugs to KEV; Two Linux Flaws Draw Immediate Attention
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

TeamT5 ThreatSonar vulnerability exploited; CISA adds flaw to KEV list
CISA added a high-severity vulnerability in TeamT5’s ThreatSonar (CVE-2024-7694) to its Known Exploited Vulnerabilities catalogue and required federal remediation by March 10, 2026. The bug allows unsafe file uploads that can be chained with elevated privileges to achieve remote command execution; a vendor patch was issued in August 2024 but evidence of in‑the‑wild exploitation has been reported.

VMware Aria Operations Exploited; CISA Adds CVE-2026-22719 to KEV
A high-severity, unauthenticated command-injection flaw, CVE-2026-22719 , is being exploited against VMware Aria Operations , and CISA has added it to the Known Exploited Vulnerabilities catalog with a federal remediation mandate. This event is one of several recent management-plane and remote‑access vulnerabilities (e.g., SolarWinds WHD, BeyondTrust) that have been weaponized quickly after disclosure, compressing patch windows and forcing urgent compensating controls.
Critical SolarWinds Web Help Desk Flaw Exploited; CISA Orders Rapid Patching
A critical unauthenticated remote code execution bug in SolarWinds Web Help Desk (WHD) rooted in AjaxProxy deserialization is being exploited in the wild and was added to CISA’s Known Exploited Vulnerabilities list, triggering compressed federal remediation deadlines. The listing arrived alongside other high-priority KEV additions this patch cycle, reinforcing that administrative consoles and legacy proxy components are high-risk and require immediate patching and network controls.

Cisco SD‑WAN Compromised; CISA and Five Eyes Order Emergency Hunts
CISA and Five Eyes partners warned of active exploitation against Cisco SD‑WAN, flagging two tracked CVEs and urging immediate hunts, log preservation, and patching. The alert joins a string of rapid, high‑impact exploit events (Fortinet, SolarWinds and other KEV additions), compressing remediation windows and forcing both near‑term incident response and longer‑term edge‑device inventory and replacement planning.

CERT-In alerts users to high-risk flaws in Apple Pages/Keynote and Google Chrome; apply patches now
India’s national cybersecurity agency has identified exploitable vulnerabilities in Apple Pages/Keynote and Google’s desktop Chrome that could allow data disclosure or remote code execution. Vendors issued fixes in late January 2026; organisations should prioritise deploying those updates immediately and treat them in the context of a broader trend of vendor emergency patches for document- and API-handling flaws.

Microsoft Intune: CISA Orders Immediate Hardening After Stryker Breach
CISA directed organizations to tighten configurations for Microsoft Intune after a disruptive incident hit Stryker on March 11; the advisory elevates endpoint-management security to an immediate compliance and operational priority. Vendor telemetry points to harvested administrative credentials and management-plane misuse, while public claims of widescale destructive wiping and actor attribution remain contested.

CISA Strained as Iran-Linked Cyber Threats Surge
CISA readiness has weakened amid staff reductions and leadership churn just as Iran-linked actors have increased disruptive operations against regional and U.S. targets. The staffing shortfall, canceled assessments, and a spike in reported disruptions amplify risk to banks and critical infrastructure.
CISA orders federal agencies to inventory, patch and phase out unsupported edge devices
CISA has issued a binding directive requiring federal civilian agencies to identify, upgrade and remove internet-exposed edge devices that no longer receive vendor security updates, citing active exploitation by advanced threat actors. Agencies have staged deadlines — three months to inventory, 12 months to start removals and 18 months to finish decommissioning — with continuous monitoring required thereafter.