TL;DR

CISA updates its KEV Catalog with five newly identified vulnerabilities that pose significant risks to federal networks. Immediate remediation is advised.

What happened

['Five new vulnerabilities added to the Known Exploited Vulnerabilities (KEV) Catalog', 'CVE-2018-14634: Linux Kernel Integer Overflow Vulnerability', 'CVE-2025-52691: SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability', 'CVE-2026-21509: Microsoft Office Security Feature Bypass Vulnerability', 'CVE-2026-23760: SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability', 'CVE-2026-24061: GNU InetUtils Argument Injection Vulnerability']

Why it matters for ops

['Malicious actors actively exploit these vulnerabilities', 'These vulnerabilities present significant risks to federal enterprises']

Mitigation

  • Apply patches for all KEV Catalog vulnerabilities
  • Monitor and secure systems based on exploitation evidence

Action items

  • Review the KEV catalog regularly
  • Prioritize remediation of listed vulnerabilities
  • Implement multi-layered security measures

Detection IOCs

  • Integer overflow attempts in Linux logs
  • Unauthorized file uploads detected via SmarterMail
  • Bypassing authentication mechanisms observed

Source link

https://www.cisa.gov/news-events/alerts/2026/01/26/cisa-adds-five-known-exploited-vulnerabilities-catalog