CISA Adds 8 New Vulnerabilities to KEV After Evidence of Active Exploitation

Views: 29 views

222/69 Thursday, April 23, 2026

The Cybersecurity and Infrastructure Security Agency has added eight newly identified security vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog after confirming they are being actively exploited in the wild. These vulnerabilities affect products from multiple vendors, including PaperCut, JetBrains, Kentico, Quest Software, Synacor, and Cisco. These flaws pose risks such as privilege escalation, unauthorized system access, and broader impacts on enterprise security.

Under the requirements of Binding Operational Directive (BOD) 22-01, U.S. federal civilian executive branch (FCEB) agencies are required to remediate KEV-listed vulnerabilities within specified deadlines. In this update, three vulnerabilities affecting Cisco Catalyst SD-WAN Manager must be addressed by April 23, 2026, while the remaining vulnerabilities have a remediation deadline of May 4, 2026. This highlights the elevated risk level of these vulnerabilities, as they have confirmed real-world exploitation.

Notably, CVE-2023-27351 in PaperCut NG/MF has previously been linked to attacks by the Lace Tempest group and the deployment of Cl0p and LockBit ransomware. Meanwhile, CVE-2025-32975 in Quest KACE Systems Management Appliance has reportedly been exploited in unpatched systems in recent incidents. Security experts strongly recommend that both public and private sector organizations review their environments for affected software, apply patches as soon as possible, and continuously monitor the KEV catalog to prioritize remediation of high-risk vulnerabilities.

Source https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html