theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability73malware15policy14breach6apt5ransomware2

vulnerability

Clear filter
Vvulnerability

CVE-2026-21514: Microsoft Office Word Privilege Escalation Via Untrusted Input Validation Flaw

CVE-2026-21514 is a privilege escalation vulnerability in Microsoft Office Word caused by the application's reliance on untrusted inputs in security decisions. An authenticated local attacker can open a crafted document to escalate from standard user to elevated privileges without additional user interaction. CISA has added this CVE to its Known Exploited Vulnerabilities catalog with a federal patch deadline of March 3, 2026.

CISA KEV·52d ago·4 min read
Vvulnerability

CVE-2026-21519: Type Confusion in Windows Desktop Window Manager Enables Local Privilege Escalation to SYSTEM

CVE-2026-21519 is a type confusion vulnerability in Microsoft's Desktop Window Manager that allows an authenticated local attacker to escalate privileges to SYSTEM on affected Windows systems. CISA has added the flaw to its Known Exploited Vulnerabilities catalog with a federal patch deadline of March 3, 2026, confirming active exploitation. Organizations should apply the latest Microsoft Windows cumulative updates immediately, prioritizing systems where standard users hold local logon rights.

CISA KEV·52d ago·3 min read
Vvulnerability

CVE-2026-21513: Microsoft MSHTML Security Bypass Enables Network-Based Exploitation on Windows

CVE-2026-21513 is a protection mechanism failure in Microsoft's MSHTML rendering engine that allows an unauthenticated remote attacker to bypass a security control via network-based delivery of malicious HTML content. Successful exploitation can lead to unauthorized code execution or information disclosure, and CISA has mandated federal agency patching by March 3, 2026. Organizations should apply current Windows cumulative updates immediately and prioritize systems where users process email or run applications embedding MSHTML.

CISA KEV·52d ago·3 min read
Vvulnerability

CVE-2026-21525: Windows Remote Access Connection Manager NULL Pointer Dereference Enables Local DoS

CVE-2026-21525 is a NULL pointer dereference in the Windows Remote Access Connection Manager (rasman.exe) that allows a local, unauthenticated attacker to crash the service and disrupt VPN and dial-up connectivity. No privileges are required beyond local system access, making the flaw relevant wherever an attacker has an existing foothold. CISA mandates federal agencies patch by 2026-03-03; organizations should apply Microsoft's security update immediately and restrict local access as an interim control.

CISA KEV·52d ago·3 min read
Vvulnerability

CVE-2026-24423: SmarterMail ConnectToHub API Exposes Servers to Unauthenticated Remote Code Execution

CVE-2026-24423 is a missing authentication vulnerability in the ConnectToHub API method of SmarterTools SmarterMail, allowing unauthenticated remote attackers to redirect the mail server to a malicious HTTP endpoint and execute arbitrary OS commands. Successful exploitation requires no credentials or user interaction and results in full server compromise. CISA has added the vulnerability to its Known Exploited Vulnerabilities catalog with a federal patch deadline of February 26, 2026.

CISA KEV·57d ago·3 min read
Vvulnerability

CVE-2025-11953: React Native Community CLI Metro Server Exposes OS Command Injection to Unauthenticated Attackers

CVE-2025-11953 is an OS command injection vulnerability in the React Native Community CLI's Metro Development Server that allows unauthenticated network attackers to execute arbitrary binaries and shell commands by sending crafted POST requests to a vulnerable endpoint. Windows systems face elevated risk due to full shell command argument control. CISA has added the vulnerability to its KEV catalog with a federal patch deadline of 2026-02-26.

CISA KEV·57d ago·3 min read
Vvulnerability

CVE-2025-40551: Unauthenticated RCE Flaw in SolarWinds Web Help Desk Demands Immediate Patching

CVE-2025-40551 is a critical unauthenticated remote code execution vulnerability in SolarWinds Web Help Desk, caused by improper deserialization of untrusted data. An attacker with network access can send a malicious serialized payload to execute arbitrary commands on the host without any credentials. CISA has added the flaw to its Known Exploited Vulnerabilities catalog with a federal patch deadline of February 6, 2026.

CISA KEV·59d ago·3 min read
Vvulnerability

CVE-2025-64328: Sangoma FreePBX Endpoint Manager OS Command Injection Enables Remote Code Execution

CVE-2025-64328 is a post-authentication OS command injection vulnerability in Sangoma FreePBX Endpoint Manager, specifically within the testconnection check_ssh_connect() function. Authenticated attackers can execute arbitrary system commands as the asterisk user, gaining remote code execution on the PBX host. CISA has added this flaw to the KEV catalog with a federal patch deadline of February 24, 2026.

CISA KEV·59d ago·3 min read
Vvulnerability

CVE-2021-39935: Unauthenticated SSRF in GitLab CI Lint API Exposes Internal Services

CVE-2021-39935 is an unauthenticated server-side request forgery (SSRF) vulnerability in the GitLab CI Lint API affecting GitLab Community and Enterprise Editions prior to version 14.3.2. An external attacker with no credentials can force the GitLab server to issue arbitrary HTTP requests, exposing internal services, cloud metadata credentials, and sensitive infrastructure. CISA has added the vulnerability to the Known Exploited Vulnerabilities catalog with a federal patch deadline of February 24, 2026.

CISA KEV·59d ago·3 min read
Vvulnerability

CVE-2019-19006: Sangoma FreePBX Authentication Bypass Grants Unauthenticated Admin Access

CVE-2019-19006 is an improper authentication vulnerability in Sangoma FreePBX that allows unauthenticated remote attackers to bypass password controls and gain full administrative access to the PBX management interface. Successful exploitation enables toll fraud, call interception, credential theft, and persistent account creation. CISA has added this CVE to the Known Exploited Vulnerabilities catalog with a federal patch deadline of February 24, 2026.

CISA KEV·59d ago·3 min read
Vvulnerability

CVE-2026-1281: Ivanti EPMM Unauthenticated Code Injection Enables Full System Compromise

CVE-2026-1281 is an unauthenticated code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that allows remote attackers to execute arbitrary code without credentials, gaining control of the EPMM service and access to all managed mobile devices and enterprise infrastructure. CISA has added the flaw to its Known Exploited Vulnerabilities catalog and mandates federal agency patching by February 1, 2026. Organizations should patch immediately, isolate exposed instances, rotate stored credentials, and audit logs for signs of exploitation.

CISA KEV·64d ago·3 min read