TL;DR

['CISA has updated its KEV Catalog with a new entry, CVE-2026-20045, emphasizing the critical nature of addressing known exploited vulnerabilities promptly.', 'BOD 22-01 mandates FCEB agencies to remediate identified KEVs by specified deadlines.']

What happened

['CISA added CVE-2026-20045 to its Known Exploited Vulnerabilities (KEV) Catalog following evidence of active exploitation.', 'CVE-2026-20045 is a code injection vulnerability in Cisco Unified Communications Products.']

Why it matters for ops

['This action highlights the significance of monitoring and remediating known exploited vulnerabilities promptly to mitigate risks from malicious cyber actors.']

Mitigation

  • Apply available security updates and patches from Cisco immediately
  • Implement strict identity and access management practices

Action items

  • Check if any systems are affected by this new KEV entry.
  • Update and patch all affected systems as soon as possible.

Detection IOCs

  • Monitoring network traffic for signs of code injection attempts targeting Cisco Unified Communications products.
  • Reviewing system logs for unauthorized access or modifications related to the identified vulnerability.

Source link

https://www.cisa.gov/news-events/alerts/2026/01/21/cisa-adds-one-known-exploited-vulnerability-catalog