CISA's KEV Catalog Update: 4 Critical Software Vulnerabilities (2026)

The U.S. government is on high alert, with the Cybersecurity and Infrastructure Security Agency (CISA) recently sounding the alarm. In a critical move, CISA has updated its Known Exploited Vulnerabilities (KEV) catalog, adding four new software flaws that are actively being exploited by malicious actors.

But here's the catch: these vulnerabilities are not just theoretical risks; they are being actively abused in the wild, posing significant threats to organizations and individuals alike. The updated list includes:

  1. CVE-2025-68645 (CVSS score: 8.8): A remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that allows attackers to access sensitive files without authentication. Imagine a burglar picking the lock to your digital safe!

  2. CVE-2025-34026 (CVSS score: 9.2): An authentication bypass in the Versa Concerto SD-WAN platform, enabling attackers to access administrative functions. This is like leaving the master key under the doormat for intruders.

  3. CVE-2025-31125 (CVSS score: 5.3): Improper access control in Vite Vitejs, allowing attackers to retrieve arbitrary files from the browser. It's as if a hacker has a direct line to your personal files.

  4. CVE-2025-54313 (CVSS score: 7.5): A supply chain attack on eslint-config-prettier and six other npm packages. This attack involves injecting malicious code, leading to the execution of a stealthy information-stealing malware. And this is the part most people miss: it's a silent intruder, stealing your secrets without you even knowing.

The latter vulnerability, CVE-2025-54313, is particularly concerning as it was part of a sophisticated phishing campaign targeting package maintainers. This campaign, which came to light in July 2025, tricked maintainers into revealing their credentials, allowing attackers to publish malicious versions of the packages.

And the plot thickens: Exploitation of CVE-2025-68645 has been ongoing since January 14, 2026, according to CrowdSec. The details of how the other vulnerabilities are being exploited remain a mystery, leaving many wondering about the extent of the threat.

With the clock ticking, Federal Civilian Executive Branch (FCEB) agencies are under pressure. They must implement the necessary fixes by February 12, 2026, to safeguard their networks from these active threats.

Stay tuned as the cybersecurity landscape continues to evolve, and remember, in the digital realm, knowledge is the ultimate defense. But the question remains, are we doing enough to stay ahead of these evolving threats? Share your thoughts in the comments below!

CISA's KEV Catalog Update: 4 Critical Software Vulnerabilities (2026)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Frankie Dare

Last Updated:

Views: 6326

Rating: 4.2 / 5 (53 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.