Known Exploited Vulnerabilities Catalog | CISA (original) (raw)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.
The KEV catalog is also available in these formats:
CSV
JSON
JSON Schema (updated 06-25-2024)
Print View
License
Ivanti | Endpoint Manager Mobile (EPMM)
CVE-2026-1340
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability: Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-04-08
- Due Date: 2026-04-11
Additional Notes
Fortinet | FortiClient EMS
CVE-2026-35616
Fortinet FortiClient EMS Improper Access Control Vulnerability: Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-04-06
- Due Date: 2026-04-09
Additional Notes
Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://fortiguard.fortinet.com/psirt/FG-IR-26-099 ; https://nvd.nist.gov/vuln/detail/CVE-2026-35616
CVE-2026-3502
TrueConf Client Download of Code Without Integrity Check Vulnerability: TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-04-02
- Due Date: 2026-04-16
Additional Notes
CVE-2026-5281
Google Dawn Use-After-Free Vulnerability: Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-04-01
- Due Date: 2026-04-15
Additional Notes
CVE-2026-3055
Citrix NetScaler Out-of-Bounds Read Vulnerability: Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-30
- Due Date: 2026-04-02
Additional Notes
CVE-2025-53521
F5 BIG-IP Stack-Based Buffer Overflow Vulnerability: F5 BIG-IP APM contains a stack-based buffer overflow vulnerability that could allow a threat actor to achieve remote code execution.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-27
- Due Date: 2026-03-30
Additional Notes
CVE-2026-33634
Aquasecurity Trivy Embedded Malicious Code Vulnerability: Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-26
- Due Date: 2026-04-09
Additional Notes
CVE-2026-33017
Langflow Code Injection Vulnerability: Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-25
- Due Date: 2026-04-08
Additional Notes
Apple | Multiple Products
CVE-2025-31277
Apple Multiple Products Buffer Overflow Vulnerability: Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-20
- Due Date: 2026-04-03
Additional Notes
Apple | Multiple Products
CVE-2025-43520
Apple Multiple Products Classic Buffer Overflow Vulnerability: Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-20
- Due Date: 2026-04-03
Additional Notes
Apple | Multiple Products
CVE-2025-43510
Apple Multiple Products Improper Locking Vulnerability: Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-20
- Due Date: 2026-04-03
Additional Notes
CVE-2025-54068
Laravel Livewire Code Injection Vulnerability: Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-20
- Due Date: 2026-04-03
Additional Notes
CVE-2025-32432
Craft CMS Code Injection Vulnerability: Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-20
- Due Date: 2026-04-03
Additional Notes
Cisco | Secure Firewall Management Center (FMC)
CVE-2026-20131
Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability: Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.
Known To Be Used in Ransomware Campaigns? Known
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-19
- Due Date: 2026-03-22
Additional Notes
CVE-2026-20963
Microsoft SharePoint Deserialization of Untrusted Data Vulnerability: Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-18
- Due Date: 2026-03-21
Additional Notes
Synacor | Zimbra Collaboration Suite (ZCS)
CVE-2025-66376
Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability: Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-18
- Due Date: 2026-04-01
Additional Notes
Wing FTP Server | Wing FTP Server
CVE-2025-47813
Wing FTP Server Information Disclosure Vulnerability: Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-16
- Due Date: 2026-03-30
Additional Notes
CVE-2026-3909
Google Skia Out-of-Bounds Write Vulnerability: Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-13
- Due Date: 2026-03-27
Additional Notes
CVE-2026-3910
Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability: Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-13
- Due Date: 2026-03-27
Additional Notes
CVE-2025-68613
n8n Improper Control of Dynamically-Managed Code Resources Vulnerability: n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution.
Known To Be Used in Ransomware Campaigns? Unknown
Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Date Added: 2026-03-11
- Due Date: 2026-03-25
Additional Notes
Subscribe to the KEV Catalog Updates
Stay up to date on the latest known exploited vulnerabilities.