Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsCISA Adds SolarWinds, Microsoft, Apple, Notepad++ Vulnerabilities to KEV Catalog
CISA Adds SolarWinds, Microsoft, Apple, Notepad++ Vulnerabilities to KEV Catalog
CIO PulseCybersecurity

CISA Adds SolarWinds, Microsoft, Apple, Notepad++ Vulnerabilities to KEV Catalog

•February 14, 2026
0
SC Media
SC Media•Feb 14, 2026

Why It Matters

These exploits target high‑value infrastructure and widely used tools, posing immediate risk to federal operations and highlighting broader supply‑chain vulnerabilities that could affect the private sector.

Key Takeaways

  • •SolarWinds WHD bypasses CSRF, CVSS 9.8, patched Jan 28
  • •Microsoft Config Manager SQL injection enables unauthenticated RCE
  • •Apple zero‑day allows arbitrary code with memory‑write
  • •Notepad++ supply‑chain attack exploited unsigned updates
  • •Federal agencies must patch by early March 2026

Pulse Analysis

CISA’s Known Exploited Vulnerabilities (KEV) catalog serves as a real‑time barometer for threats that have moved beyond theory into active exploitation. By adding SolarWinds Web Help Desk, Microsoft Configuration Manager, Apple OS, and Notepad++ flaws, the agency signals that attackers are leveraging both legacy enterprise tools and consumer software to gain footholds in high‑profile networks. The catalog’s inclusion criteria demand evidence of exploitation, making it a trusted source for security teams prioritizing patch management and threat‑intel integration.

The technical vectors behind the four entries illustrate a range of attack techniques. SolarWinds WHD’s CSRF‑whitelist bypass allows unauthenticated users to invoke privileged functions via crafted URLs, while Microsoft’s Configuration Manager suffers from an unsanitized XML‑to‑SQL pathway that can trigger remote code execution through the xp_cmdshell procedure. Apple’s zero‑day exploits a memory‑write primitive to run arbitrary code, a hallmark of sophisticated nation‑state actors. Notepad++’s supply‑chain breach, attributed to the China‑backed Lotus Blossom group, leveraged unsigned update metadata, demonstrating how even trusted development tools can become conduits for malicious payloads.

For organizations, the KEV additions reinforce the need for accelerated patch cycles and layered defenses. Federal agencies face hard deadlines—mid‑February for SolarWinds and early March for the remaining flaws—underscoring regulatory pressure that often cascades to contractors and partners. Enterprises should adopt automated vulnerability scanning tied to CISA’s KEV feed, enforce strict code‑signing verification for third‑party software, and implement network segmentation to limit exposure of internet‑facing endpoints. By treating these high‑severity CVEs as priority items, businesses can mitigate the risk of lateral movement and data compromise that stem from today’s most actively exploited bugs.

CISA adds SolarWinds, Microsoft, Apple, Notepad++ vulnerabilities to KEV catalog

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...