Site icon TheCyberThrone

CISA KEV Alert: 5 Critical Vulnerabilities Added to Catalog

Advertisements

As a cybersecurity analyst tracking threat intelligence, In a rapid-fire update, CISA added four flaws on January 22 and one on January 23, 2026, confirming active exploitation across dev tools, SD-WAN, email servers, and VMware virtualization.These span supply-chain attacks to remote code execution (RCE), underscoring 2026’s aggressive threat landscape. Federal deadline: Feb 12-13 via BOD 22-01.

January 22 Additions: Dev, Network, and Email Chaos

CISA flagged these for in-the-wild abuse, hitting diverse attack surfaces.

CVE-2025-54313: Prettier eslint-config-prettier (Critical)

CVE-2025-31125: Vitejs/Vite (High)

CVE-2025-34026: Versa Concerto SD-WAN (Critical)

CVE-2025-68645: Synacor Zimbra Collaboration Suite (Critical)

January 23 Addition: VMware vCenter RCE Resurfaces

CVE-2024-37079: Broadcom VMware vCenter Server (CVSS 9.8, Critical)

Threat Intel & Trends

Ransomware favors these (e.g., vCenter for persistence); state actors hit VMware DCERPC repeatedly. Dev supply-chain (Prettier/Vite) echoes SolarWinds—scan npm deps ruthlessly. No public PoCs for most, but wild exploits confirm chains exist.

Actionable Remediation for Teams

  1. Inventory: Qualys/Nessus scan for affected versions.
  2. Patch Order: VMware/Zimbra first (RCE), then dev tools.
  3. Mitigations: Firewall dev servers; MFA proxies; offline backups.
  4. Monitor: SIEM for DCERPC anomalies, npm install logs.
  5. Verify: Post-patch vuln scans; test in staging.
Exit mobile version