What's Happening?
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include eight additional security flaws. Among these are three newly flagged vulnerabilities, including a high-severity information
disclosure bug in Cisco Catalyst SD-WAN Manager, identified as CVE-2026-20133. This flaw, which was patched in February, could allow attackers to access the API of an affected system and read information on the underlying operating system. Additionally, CISA has added vulnerabilities from Kentico Xperience and Zimbra Collaboration Suite (ZCS) that have been exploited in attacks. The Kentico vulnerability, CVE-2025-2749, involves a path traversal and arbitrary file upload issue, while the ZCS vulnerability, CVE-2025-48700, is an XSS bug that can execute JavaScript code within a user's session. CISA has urged federal agencies to patch these vulnerabilities by specific deadlines in April and May.
Why It's Important?
The inclusion of these vulnerabilities in CISA's KEV catalog underscores the ongoing threat posed by cyberattacks exploiting known software flaws. By highlighting these vulnerabilities, CISA aims to prompt federal agencies and other organizations to prioritize patching efforts, thereby reducing the risk of exploitation. The vulnerabilities in widely used systems like Cisco's SD-WAN Manager and Zimbra Collaboration Suite could potentially impact a large number of organizations, leading to unauthorized access, data breaches, and other security incidents. Addressing these vulnerabilities is crucial for maintaining the integrity and security of IT infrastructures across various sectors, including government, healthcare, and finance.
What's Next?
Federal agencies are required to patch the Cisco and Zimbra vulnerabilities by April 23, with the remaining issues to be addressed by May 4. This timeline reflects the urgency of mitigating these security risks. Organizations are expected to follow suit, implementing necessary updates and security measures to protect against potential exploitation. The ongoing identification and disclosure of such vulnerabilities highlight the need for continuous vigilance and proactive cybersecurity strategies. As cyber threats evolve, organizations must remain agile in their response to emerging vulnerabilities and ensure robust security protocols are in place.












