CISA Known Exploited Vulnerabilities

This dashboard displays the latest vulnerabilities published by the Cybersecurity & Infrastructure Security Agency (CISA).

CVE-2025-26399

SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

Vendor: SolarWinds

Product: Web Help Desk

Added: 2026-03-09

Due Date: 2026-03-12

Description:

SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-502

CVE-2026-1603

Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability

Vendor: Ivanti

Product: Endpoint Manager (EPM)

Added: 2026-03-09

Due Date: 2026-03-23

Description:

Ivanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential data.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-288

CVE-2017-7921

Hikvision Multiple Products Improper Authentication Vulnerability

Vendor: Hikvision

Product: Multiple Products

Added: 2026-03-05

Due Date: 2026-03-26

Description:

Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and gain access to sensitive information.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-287

CVE-2021-22681

Rockwell Multiple Products Insufficient Protected Credentials Vulnerability

Vendor: Rockwell

Product: Multiple Products

Added: 2026-03-05

Due Date: 2026-03-26

Description:

Multiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to be discovered. This key is used to verify Logix controllers are communicating with Rockwell Automation design software. If successfully exploited, this vulnerability could allow an unauthorized application to connect with Logix controllers. To leverage this vulnerability, an unauthorized user would require network access to the controller.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-522

CVE-2023-43000

Apple Multiple products Use-After-Free Vulnerability

Vendor: Apple

Product: Multiple Products

Added: 2026-03-05

Due Date: 2026-03-26

Description:

Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-416

CVE-2021-30952

Apple Multiple Products Integer Overflow or Wraparound Vulnerability

Vendor: Apple

Product: Multiple Products

Added: 2026-03-05

Due Date: 2026-03-26

Description:

Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted web content that may lead to arbitrary code execution.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-190

CVE-2023-41974

Apple iOS and iPadOS Use-After-Free Vulnerability

Vendor: Apple

Product: iOS and iPadOS

Added: 2026-03-05

Due Date: 2026-03-26

Description:

Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-416

CVE-2026-22719

Broadcom VMware Aria Operations Command Injection Vulnerability

Vendor: Broadcom

Product: VMware Aria Operations

Added: 2026-03-03

Due Date: 2026-03-24

Description:

Broadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated attacker to execute arbitrary commands, potentially leading to remote code execution during support‑assisted product migration.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-77

CVE-2026-21385

Qualcomm Multiple Chipsets Memory Corruption Vulnerability

Vendor: Qualcomm

Product: Multiple Chipsets

Added: 2026-03-03

Due Date: 2026-03-24

Description:

Multiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-190

CVE-2022-20775

Cisco SD-WAN Path Traversal Vulnerability

Vendor: Cisco

Product: SD-WAN

Added: 2026-02-25

Due Date: 2026-02-27

Description:

Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.

Required Action:

Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.

CWEs:

CWE-25 CWE-282

CVE-2026-20127

Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability

Vendor: Cisco

Product: Catalyst SD-WAN Controller and Manager

Added: 2026-02-25

Due Date: 2026-02-27

Description:

Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.

Required Action:

Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.

CWEs:

CWE-287

CVE-2026-25108

Soliton Systems K.K FileZen OS Command Injection Vulnerability

Vendor: Soliton Systems K.K

Product: FileZen

Added: 2026-02-24

Due Date: 2026-03-17

Description:

Soliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP request.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-78

CVE-2025-49113

RoundCube Webmail Deserialization of Untrusted Data Vulnerability

Vendor: Roundcube

Product: Webmail

Added: 2026-02-20

Due Date: 2026-03-13

Description:

RoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-502

CVE-2025-68461

RoundCube Webmail Cross-site Scripting Vulnerability

Vendor: Roundcube

Product: Webmail

Added: 2026-02-20

Due Date: 2026-03-13

Description:

RoundCube Webmail contains a cross-site scripting vulnerability via the animate tag in an SVG document.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-79

CVE-2021-22175

GitLab Server-Side Request Forgery (SSRF) Vulnerability

Vendor: GitLab

Product: GitLab

Added: 2026-02-18

Due Date: 2026-03-11

Description:

GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled.

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CWEs:

CWE-918