{"id":45380,"date":"2026-04-14T16:12:35","date_gmt":"2026-04-14T08:12:35","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/14\/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software\/"},"modified":"2026-04-14T16:12:35","modified_gmt":"2026-04-14T08:12:35","slug":"cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/14\/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software\/","title":{"rendered":"CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhkkewWzrjyqzejet7cyCWdTUMfgjGZgkDpis6rUlh7qnyPpmcN1k_vVdKvziAZq2cOkFQDrJNM8E6WE8Cl7oPNdq94MOXJLa0nkbEmAFCB_MnjLQzTy-WjHGa6yuLhm7dPzuW3YEQeFIfOT1Tr25NgALeTL6vFDhzmJrCRMLL0GBpOhkwQm_Zirk_9aNjr\/s1600\/warning.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhkkewWzrjyqzejet7cyCWdTUMfgjGZgkDpis6rUlh7qnyPpmcN1k_vVdKvziAZq2cOkFQDrJNM8E6WE8Cl7oPNdq94MOXJLa0nkbEmAFCB_MnjLQzTy-WjHGa6yuLhm7dPzuW3YEQeFIfOT1Tr25NgALeTL6vFDhzmJrCRMLL0GBpOhkwQm_Zirk_9aNjr\/s1600\/warning.jpg\" alt=\"CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software\"\/><\/a><\/div>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on&#160;Monday <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/04\/13\/cisa-adds-seven-known-exploited-vulnerabilities-catalog\">added<\/a> half a dozen security flaws to its Known Exploited Vulnerabilities&#160;(<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">KEV<\/a>) catalog, citing evidence of active exploitation.<\/p>\n<p>The list of vulnerabilities is as follows&#160;-<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-21643\">CVE-2026-21643<\/a><\/strong> (CVSS score: 9.1) -&#160; An SQL injection vulnerability in&#160; Fortinet FortiClient EMS that could allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.<\/li>\n<li><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2020-9715\">CVE-2020-9715<\/a><\/strong> (CVSS score: 7.8) &#8211; A use-after-free vulnerability in Adobe Acrobat Reader that could result in remote code execution.<\/li>\n<li><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2023-36424\">CVE-2023-36424<\/a><\/strong> (CVSS score: 7.8) &#8211; An out-of-bounds read vulnerability in Microsoft Windows Common Log File System Driver that could result in privilege escalation.<\/li>\n<li><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2023-21529\">CVE-2023-21529<\/a><\/strong> (CVSS score: 8.8) &#8211; A deserialization of untrusted data in Microsoft Exchange Server that could allow an authenticated attacker to achieve remote code execution.&#160;<\/li>\n<li><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-60710\">CVE-2025-60710<\/a><\/strong> (CVSS score: 7.8) &#8211; An improper link resolution before file access vulnerability in Host Process for Windows Tasks that could allow an authorized attacker to <a href=\"https:\/\/www.vicarius.io\/vsociety\/posts\/cve-2025-60710-mitigation-script-eop-vulnerability-in-host-process-for-windows-tasks\">elevate privileges locally<\/a>.<\/li>\n<li><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-1854\">CVE-2012-1854<\/a><\/strong> (CVSS score: 7.8) &#8211; An insecure library loading vulnerability in Microsoft Visual Basic for Applications (VBA) that could result in remote code execution.<\/li>\n<\/ul>\n<p>The addition of CVE-2026-21643 to the KEV catalog comes after Defused&#160;Cyber <a href=\"https:\/\/thehackernews.com\/2026\/03\/weekly-recap-telecom-sleeper-cells-llm.html#:~:text=Fortinet%20FortiClient%20EMS%20Flaw%20Comes%20Under%20Attack\">said<\/a> it detected exploitation attempts targeting the flaw since March 24, 2026. Last&#160;week,&#160;Microsoft <a href=\"https:\/\/thehackernews.com\/2026\/04\/china-linked-storm-1175-exploits-zero.html\">revealed<\/a> that a threat actor it tracks as Storm-1175 has been weaponizing CVE-2023-21529 in attacks to deliver Medusa ransomware.<\/p>\n<p>As for CVE-2012-1854, the Windows&#160;maker<a href=\"https:\/\/learn.microsoft.com\/en-us\/security-updates\/securitybulletins\/2012\/ms12-046\">acknowledged<\/a>&#160;in an advisory released&#160;in July 2012&#160;that it&#8217;s aware of &#8220;limited, targeted attacks&#8221; attempting&#160;to abuse the vulnerability. The exact nature of the attacks is presently&#160;unknown.<\/p>\n<p>There are currently no public reports referencing the exploitation of the remaining three vulnerabilities. In&#160;light of active attacks, Federal Civilian Executive Branch (FCEB)&#160;agencies are&#160;required to apply the fixes by April 27,&#160;2026.<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on&#160;Monday added half a dozen security flaws to its Known Exploited Vulnerabilities&#160;(KEV) catalog, citing evidence of active exploitation.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45380","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45380"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45380\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}