TL;DR

['CISA has included CVE-2021-22175 and CVE-2026-22769 in its KEV catalog, citing evidence of exploitation. BOD 22-01 mandates FCEB agencies to remediate these vulnerabilities.', 'CVE-2021-22175 affects GitLab SSRF; CVE-2026-22769 involves Dell RecoverPoint credential issues. Both require immediate attention due to expl

What happened

['CISA added two new vulnerabilities, CVE-2021-22175 and CVE-2026-22769, to its Known Exploited Vulnerabilities (KEV) Catalog based on evidence of active exploitation.', 'CVE-2021-22175 is a GitLab SSRF vulnerability; CVE-2026-22769 is related to hard-coded credentials in Dell RecoverPoint for Virtual Machines.']

Why it matters for ops

['These vulnerabilities pose significant risks, including potential unauthorized access and data breaches.', 'Remediation of these vulnerabilities by the specified deadline helps protect against active cyber threats targeting FCEB agencies.', 'Immediate action is advised due to evidence of exploitation and risk of widespread impact on critical systems.']

Mitigation

  • Patch GitLab and Dell RecoverPoint systems as soon as possible with security updates addressing these vulnerabilities.
  • Implement strict access controls and monitor systems closely to detect any unauthorized activity.
  • Conduct regular audits and reviews of configurations and credentials to identify potential weak points.

Action items

  • Review the KEV Catalog for all listed vulnerabilities affecting your environment.
  • Prioritize remediation efforts based on risk assessment and impact analysis.
  • Communicate with stakeholders about the urgency and importance of addressing these issues.

Detection IOCs

  • Search for indicators of exploitation attempts related to the CVEs in network traffic, logs, and vulnerability management tools.
  • Look for unusual authentication patterns or credential misuse indicative of hard-coded credential abuse.

Source link

https://www.cisa.gov/news-events/alerts/2026/02/18/cisa-adds-two-known-exploited-vulnerabilities-catalog