CISA Adds Six Exploited Vulnerabilities to KEV Catalog
CISA Adds 6 Known Exploited Vulnerabilities to KEV Catalog
On April 14, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added six security vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation in the wild. These flaws impact Fortinet, Microsoft, and Adobe products commonly used across enterprise and government environments.
Federal Civilian Executive Branch (FCEB) agencies are required to remediate all six flaws by April 27, 2026, under Binding Operational Directive (BOD) 22‑01. CISA strongly urges private‑sector organizations to do the same.
Vulnerabilities Added (April 14, 2026)
CVE‑2026‑21643 – Fortinet FortiClient EMS
SQL Injection (CVSS 9.1)
Allows unauthenticated remote code execution via crafted HTTP requests.
▶ Exploitation observed since March 24, 2026.CVE‑2020‑9715 – Adobe Acrobat Reader
Use‑after‑free (CVSS 7.8)
Enables remote code execution when malicious PDF files are opened.CVE‑2023‑36424 – Windows Common Log File System (CLFS)
Out‑of‑bounds read (CVSS 7.8)
Leads to local privilege escalation.CVE‑2023‑21529 – Microsoft Exchange Server
Deserialization of untrusted data (CVSS 8.8)
Enables authenticated remote code execution.
▶ Exploited by threat actor Storm‑1175 to deploy Medusa ransomware.CVE‑2025‑60710 – Host Process for Windows Tasks
Improper link resolution (CVSS 7.8)
Allows local privilege escalation.CVE‑2012‑1854 – Microsoft Visual Basic for Applications (VBA)
Insecure library loading (CVSS 7.8)
Can result in remote code execution; Microsoft previously acknowledged targeted attacks.
Why This Matters
- KEV inclusion means real‑world exploitation, not theoretical risk.
- Several flaws enable ransomware deployment or full system compromise.
- The mix of new and legacy vulnerabilities highlights ongoing patch‑management gaps across environments.
- Exchange and Fortinet flaws are especially concerning due to their enterprise and internet‑facing use cases.
CISA reiterates that KEV vulnerabilities represent the highest‑priority patching items for defenders. [cisa.gov]
Recommended Actions
- Immediately patch all affected systems (do not wait until April 27).
- Prioritize:
- Internet‑facing Fortinet FortiClient EMS servers
- Microsoft Exchange servers
- Endpoints running Adobe Acrobat Reader
- Hunt for indicators of compromise (IOCs) tied to Medusa ransomware and Fortinet exploitation campaigns.
- Ensure older vulnerabilities (like CVE‑2012‑1854) are not overlooked in legacy systems.
.png)