CISA Known Exploited Vulnerabilities

This dashboard displays the latest vulnerabilities published by the Cybersecurity & Infrastructure Security Agency (CISA).

CVE-2009-0238 Recently Added

Microsoft Office Remote Code Execution

Vendor: Microsoft

Product: Office

Added: 2026-04-14

Due Date: 2026-04-28

Description:

Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-94

CVE-2026-32201 Recently Added

Microsoft SharePoint Server Improper Input Validation Vulnerability

Vendor: Microsoft

Product: SharePoint Server

Added: 2026-04-14

Due Date: 2026-04-28

Description:

Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-20

CVE-2012-1854 Recently Added

Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability

Vendor: Microsoft

Product: Visual Basic for Applications (VBA)

Added: 2026-04-13

Due Date: 2026-04-27

Description:

Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-426

CVE-2025-60710 Recently Added

Microsoft Windows Link Following Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2026-04-13

Due Date: 2026-04-27

Description:

Microsoft Windows contains a link following vulnerability that allows for privilege escalation

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-59

CVE-2023-21529 Recently Added

Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability

Vendor: Microsoft

Product: Exchange Server

Added: 2026-04-13

Due Date: 2026-04-27

Description:

Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-502

CVE-2023-36424 Recently Added

Microsoft Windows Out-of-Bounds Read Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2026-04-13

Due Date: 2026-04-27

Description:

Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-125

CVE-2020-9715 Recently Added

Adobe Acrobat Use-After-Free Vulnerability

Vendor: Adobe

Product: Acrobat

Added: 2026-04-13

Due Date: 2026-04-27

Description:

Adobe Acrobat contains a use-after-free vulnerability that allows for code execution

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-416

CVE-2026-21643 Recently Added

Fortinet SQL Injection Vulnerability

Vendor: Fortinet

Product: FortiClient EMS

Added: 2026-04-13

Due Date: 2026-04-16

Description:

Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-89

CVE-2026-34621 Recently Added

Adobe Acrobat and Reader Prototype Pollution Vulnerability

Vendor: Adobe

Product: Acrobat and Reader

Added: 2026-04-13

Due Date: 2026-04-27

Description:

Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-1321

CVE-2026-1340

Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability

Vendor: Ivanti

Product: Endpoint Manager Mobile (EPMM)

Added: 2026-04-08

Due Date: 2026-04-11

Description:

Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-94

CVE-2026-35616

Fortinet FortiClient EMS Improper Access Control Vulnerability

Vendor: Fortinet

Product: FortiClient EMS

Added: 2026-04-06

Due Date: 2026-04-09

Description:

Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-284

CVE-2026-3502

TrueConf Client Download of Code Without Integrity Check Vulnerability

Vendor: TrueConf

Product: Client

Added: 2026-04-02

Due Date: 2026-04-16

Description:

TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-494

CVE-2026-5281

Google Dawn Use-After-Free Vulnerability

Vendor: Google

Product: Dawn

Added: 2026-04-01

Due Date: 2026-04-15

Description:

Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-416

CVE-2026-3055

Citrix NetScaler Out-of-Bounds Read Vulnerability

Vendor: Citrix

Product: NetScaler

Added: 2026-03-30

Due Date: 2026-04-02

Description:

Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-125

CVE-2025-53521

F5 BIG-IP Stack-Based Buffer Overflow Vulnerability

Vendor: F5

Product: BIG-IP

Added: 2026-03-27

Due Date: 2026-03-30

Description:

F5 BIG-IP APM contains a stack-based buffer overflow vulnerability that could allow a threat actor to achieve remote code execution.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-121