TL;DR
['CISA has updated its KEV Catalog with a new entry, CVE-2026-20045, emphasizing the critical nature of addressing known exploited vulnerabilities promptly.', 'BOD 22-01 mandates FCEB agencies to remediate identified KEVs by specified deadlines.']
What happened
['CISA added CVE-2026-20045 to its Known Exploited Vulnerabilities (KEV) Catalog following evidence of active exploitation.', 'CVE-2026-20045 is a code injection vulnerability in Cisco Unified Communications Products.']
Why it matters for ops
['This action highlights the significance of monitoring and remediating known exploited vulnerabilities promptly to mitigate risks from malicious cyber actors.']
Mitigation
- Apply available security updates and patches from Cisco immediately
- Implement strict identity and access management practices
Action items
- Check if any systems are affected by this new KEV entry.
- Update and patch all affected systems as soon as possible.
Detection IOCs
- Monitoring network traffic for signs of code injection attempts targeting Cisco Unified Communications products.
- Reviewing system logs for unauthorized access or modifications related to the identified vulnerability.