theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability72malware15policy14breach6apt4ransomware1

vulnerability

Clear filter
Vvulnerability

CVE-2021-22681: Rockwell Automation Studio 5000 Exposes Verification Key, Enabling Unauthorized Logix Controller Access

CVE-2021-22681 affects Rockwell Automation's Studio 5000 Logix Designer, which stores a controller verification key without adequate protection. An attacker with network access can extract the key and use it to connect unauthorized applications directly to Logix PLCs, enabling ladder logic modification, configuration theft, or process disruption. CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog with a federal patching deadline of March 26, 2026.

CISA KEV·29d ago·3 min read
Vvulnerability

CVE-2026-21385: Qualcomm Chipset Memory Corruption Flaw Enables Privilege Escalation Across Mobile and IoT Devices

CVE-2026-21385 is a memory corruption vulnerability affecting multiple Qualcomm chipsets, triggered by improper alignment handling during memory allocation. Successful local exploitation can lead to privilege escalation or denial of service on Android smartphones, tablets, and IoT devices using Qualcomm silicon. CISA mandates federal agency remediation by 2026-03-24; enterprises should immediately inventory affected devices and apply OEM-issued patches.

CISA KEV·31d ago·3 min read
Vvulnerability

CVE-2026-Kimwolf: Analysis of the Kimwolf Botnet Operator 'Dort' and Associated Threat Activity

The Kimwolf botnet exploited vulnerabilities in residential proxy services to infect internal network devices, causing widespread DDoS and harassment attacks. The operator, known as Dort, identified as Jacob Butler from Canada, leveraged multiple aliases and cybercrime tools to facilitate account takeovers and retaliatory attacks against researchers. Patching proxy systems and enforcing strict network controls are critical to mitigating this threat.

Krebs on Security·34d ago·3 min read
Vvulnerability

CVE-2022-20775: Cisco SD-WAN CLI Path Traversal Enables Root-Level Privilege Escalation

CVE-2022-20775 is a path traversal vulnerability in Cisco SD-WAN's CLI that allows an authenticated local attacker to bypass access controls and execute arbitrary commands as root. The flaw affects Cisco SD-WAN deployments and carries a CISA KEV remediation deadline of February 27, 2026 for federal agencies. Administrators should apply Cisco's official patches immediately and restrict CLI access to trusted accounts as an interim control.

CISA KEV·37d ago·3 min read
Vvulnerability

CVE-2025-68461: Roundcube Webmail SVG Animate Tag Enables Stored XSS Attack

CVE-2025-68461 is a cross-site scripting vulnerability in Roundcube Webmail caused by inadequate sanitization of the SVG `<animate>` tag. An attacker can deliver a malicious SVG via email to execute arbitrary JavaScript in a victim's authenticated session, enabling session hijacking, credential theft, and unauthorized account actions. CISA requires federal agencies to patch by March 13, 2026; all organizations should upgrade Roundcube immediately and consider blocking SVG rendering as an interim control.

CISA KEV·42d ago·3 min read
Vvulnerability

CVE-2026-22769: Dell RecoverPoint for Virtual Machines Exposes Root Access via Hard-Coded Credentials

CVE-2026-22769 affects Dell RecoverPoint for Virtual Machines (RP4VMs) and allows unauthenticated remote attackers to gain root-level OS access using hard-coded credentials embedded in the product. Exploitation requires no user interaction and no valid credentials, giving attackers full control over backup and recovery infrastructure. CISA requires federal agencies to patch by February 21, 2026; all organizations should isolate affected appliances, apply Dell's patch immediately, and audit for existing persistence.

CISA KEV·44d ago·3 min read
Vvulnerability

CVE-2021-22175: GitLab Webhook SSRF Allows Internal Network Access via Malicious Requests

CVE-2021-22175 is an SSRF vulnerability in self-managed GitLab instances that allows authenticated attackers with webhook creation permissions to force the GitLab server to make requests to internal network resources, including databases, admin interfaces, and cloud metadata endpoints. The flaw bypasses network segmentation by using the GitLab server itself as a proxy. CISA has added it to the Known Exploited Vulnerabilities catalog with a federal patch deadline of March 11, 2026.

CISA KEV·44d ago·3 min read
Vvulnerability

CVE-2020-7796: Zimbra Collaboration Suite SSRF Flaw via WebEx Zimlet Exposes Internal Infrastructure

CVE-2020-7796 is an unauthenticated SSRF vulnerability in Synacor Zimbra Collaboration Suite, triggered when the WebEx zimlet is installed and zimlet JSP processing is enabled. Attackers can force the Zimbra server to issue arbitrary internal HTTP requests, enabling access to backend services and cloud metadata endpoints. CISA has added this to its Known Exploited Vulnerabilities catalog with a federal remediation deadline of March 10, 2026.

CISA KEV·45d ago·3 min read
Vvulnerability

CVE-2025-40536: SolarWinds Web Help Desk Authentication Bypass Exposes Restricted Functionality to Unauthenticated Attackers

CVE-2025-40536 is an authentication bypass vulnerability in SolarWinds Web Help Desk that allows unauthenticated remote attackers to access restricted application functionality without credentials. Successful exploitation can lead to data theft, privilege escalation, and lateral movement through connected enterprise systems. CISA has added the flaw to its Known Exploited Vulnerabilities catalog and requires federal agencies to patch by February 15, 2026.

CISA KEV·50d ago·3 min read
Vvulnerability

Microsoft Patches Six Zero-Day Vulnerabilities Impacting Windows and Developer Tools in February 2026 Update

Microsoft's February 2026 Patch Tuesday addresses over 50 vulnerabilities including six zero-day flaws actively exploited in the wild. Critical fixes affect Windows Shell, MSHTML, Microsoft Word, Remote Desktop Services, Desktop Window Manager, and developer tools such as GitHub Copilot and VS Code. Administrators should urgently apply these patches to prevent privilege escalation, code execution, and denial-of-service attacks.

Krebs on Security·51d ago·2 min read
Vvulnerability

CVE-2026-21519: Type Confusion in Windows Desktop Window Manager Enables Local Privilege Escalation to SYSTEM

CVE-2026-21519 is a type confusion vulnerability in Microsoft's Desktop Window Manager that allows an authenticated local attacker to escalate privileges to SYSTEM on affected Windows systems. CISA has added the flaw to its Known Exploited Vulnerabilities catalog with a federal patch deadline of March 3, 2026, confirming active exploitation. Organizations should apply the latest Microsoft Windows cumulative updates immediately, prioritizing systems where standard users hold local logon rights.

CISA KEV·52d ago·3 min read
Vvulnerability

CVE-2026-21533: Windows Remote Desktop Services Privilege Escalation Exposes Systems to Full Compromise

CVE-2026-21533 is an improper privilege management vulnerability in Microsoft Windows Remote Desktop Services that allows an authenticated local attacker to escalate privileges to SYSTEM level. CISA has added it to the Known Exploited Vulnerabilities catalog with a mandatory patch deadline of March 3, 2026, for federal agencies. Organizations should apply Microsoft's patch immediately, restrict RDS access, enforce MFA on RDP endpoints, and monitor for privilege escalation indicators.

CISA KEV·52d ago·3 min read