CybersecurityFebruary 19, 2026

CISA Adds 4 Actively Exploited Vulnerabilities to KEV Catalog

SI

Secured Intel Team

Editor

 CISA Adds 4 Actively Exploited Vulnerabilities to KEV Catalog

In 2025, the average time between vulnerability disclosure and active exploitation dropped to just 5 days (Cybersecurity Ventures, 2025). That window is shrinking every year — and the latest update to CISA's Known Exploited Vulnerabilities (KEV) Catalog is a direct reminder of what happens when organizations fall behind. Four newly added flaws, ranging from a 17-year-old ActiveX vulnerability to a freshly discovered Chromium flaw, are currently being exploited in the wild.

This update carries weight beyond routine patch notices. It invokes Binding Operational Directive (BOD) 22-01, which legally obligates Federal Civilian Executive Branch (FCEB) agencies to remediate KEV entries by specific deadlines. If attackers are actively using these vulnerabilities, your exposure window is measured in days — not weeks. This post breaks down each CVE, explains why it matters, and outlines what your security team should do right now.


Understanding the CISA KEV Catalog and BOD 22-01

The KEV Catalog is not a static advisory list. CISA describes it as a "living list" — updated continuously as evidence of real-world exploitation emerges. Every entry is backed by confirmed exploitation data, not theoretical risk scores alone. That makes it one of the most operationally relevant vulnerability prioritization tools available to security teams today.

What Drives a Vulnerability onto the KEV List

CISA adds a CVE when three conditions are met: a CVE ID is assigned, reliable evidence of active exploitation exists, and clear remediation guidance is available. This evidence-based approach means every KEV entry represents a genuine, active threat — not just a high CVSS score.

Federal Mandates and Private Sector Implications

BOD 22-01 mandates that FCEB agencies patch KEV entries within defined deadlines — typically 2 to 3 weeks for newer vulnerabilities. While private sector organizations are not legally bound, CISA urges all enterprises to treat the KEV Catalog as a prioritization signal in their vulnerability management programs.

Pro Tip: Organizations aligned with NIST SP 800-53, ISO 27001, or CIS Controls v8 can map KEV entries directly to control gaps — making remediation prioritization faster and audit-ready.


The Four Newly Added CVEs: A Technical Breakdown

Each of the four newly cataloged vulnerabilities represents a distinct attack surface. Together, they illustrate how threat actors exploit both legacy systems and modern software stacks.

CVE-2008-0015 — Microsoft Windows Video ActiveX Remote Code Execution

This vulnerability is 17 years old. Its presence on the 2025 KEV list is a stark reminder that legacy systems remain attractive targets. The flaw exists in the Microsoft Video ActiveX control (msvidctl.dll) and allows a remote attacker to execute arbitrary code when a victim visits a specially crafted webpage. The attack requires no authentication and can trigger via a browser, making it a reliable vector for drive-by download campaigns.

CVE-2020-7796 — Synacor Zimbra Server-Side Request Forgery

This Server-Side Request Forgery (SSRF) vulnerability in the Zimbra Collaboration Suite allows an unauthenticated attacker to make the server send HTTP requests to internal resources. Attackers exploit SSRF to probe internal network topology, access cloud metadata endpoints, and pivot toward more sensitive systems.

Zimbra is widely deployed in government and enterprise environments. SSRF flaws are frequently chained with other vulnerabilities to achieve lateral movement or data exfiltration — making prompt patching critical even for organizations that believe their Zimbra deployment is "internal only."

CVE-2024-7694 — TeamT5 ThreatSonar Unrestricted File Upload

This vulnerability affects ThreatSonar, an endpoint threat detection product. An unrestricted file upload flaw allows authenticated users to upload malicious files — such as web shells — to the server, enabling remote code execution. The irony of a security tool containing a high-severity flaw is not lost on the threat actor community.

Security products are high-value targets. Attackers know that compromising a security platform can blind defenders, disable detection, and grant elevated access across the monitored environment. This CVE demands immediate attention from any organization running ThreatSonar.

CVE-2026-2441 — Google Chromium CSS Use-After-Free

Use-after-free (UAF) vulnerabilities occur when a program continues to use memory after it has been freed, leading to unpredictable behavior — including arbitrary code execution. This Chromium flaw exists in the CSS processing engine and can be triggered by a maliciously crafted webpage.

Browser-based vulnerabilities are among the highest-impact attack vectors in modern threat landscapes. A single malicious link, delivered via phishing or a compromised website, is sufficient to trigger exploitation. Given Chromium's market share — powering Chrome, Edge, and dozens of other browsers — the affected population is enormous.

Table: Summary of Newly Added KEV Entries

CVEAffected ProductVulnerability TypeAuthentication RequiredPrimary Risk
CVE-2008-0015Microsoft Windows (ActiveX)Remote Code ExecutionNoFull system compromise
CVE-2020-7796Synacor ZimbraServer-Side Request ForgeryNoInternal network access
CVE-2024-7694TeamT5 ThreatSonarUnrestricted File UploadYes (low-priv)Web shell / RCE
CVE-2026-2441Google ChromiumUse-After-FreeNoBrowser-based RCE

Why This KEV Update Highlights a Persistent Problem

The mix of vulnerabilities in this update — a flaw from 2008 sitting alongside one from 2026 — illustrates two persistent challenges that plague enterprise vulnerability management programs.

The Legacy Vulnerability Problem

Organizations frequently deprioritize old CVEs, assuming threat actors focus on newer exploits. This assumption is wrong. Ransomware groups and nation-state actors routinely weaponize decades-old vulnerabilities. A 2024 Mandiant analysis found that over 30% of initial access techniques leveraged vulnerabilities more than two years old (Mandiant, 2024). Without a complete asset inventory, you cannot patch what you do not know exists.

The Security Tool Blind Spot

CVE-2024-7694 exposes a counterintuitive risk: your security stack is part of your attack surface. Organizations often exclude security tools from rigorous patch management, treating them as inherently trusted. Threat actors exploit this gap. MITRE ATT&CK Technique T1190 (Exploit Public-Facing Application) applies directly here — successfully compromising a security platform can blind defenders and grant elevated access across the monitored environment.

Table: Common Vulnerability Management Gaps vs. Recommended Controls

GapRiskRecommended Control
Incomplete asset inventoryUnknown exposureContinuous asset discovery (CIS Control 1)
Security tools excluded from patchingBlind spot exploitationUnified patch management policy
CVSS-only prioritizationKEV entries deprioritizedSupplement CVSS with KEV and EPSS data
No SLA for critical patchesExtended exposure windowRisk-tiered SLA framework
Fragmented patch reportingAudit failuresCentralized patch compliance dashboard

Actionable Remediation Steps for Security Teams

Knowing about a vulnerability and fixing it are two different things. Here is a prioritized remediation approach aligned with frameworks including NIST SP 800-40 and CIS Controls v8.

Immediate Actions (Within 24–72 Hours)

  1. Query your asset management system for all affected products: Windows systems with legacy ActiveX components, Zimbra deployments, ThreatSonar installations, and Chromium-based browsers.
  2. Apply vendor patches immediately where available. For CVE-2026-2441, ensure all Chromium-based browsers are updated to the latest stable release across every endpoint.
  3. Where immediate patching is not possible, apply compensating controls: disable the affected ActiveX control via Group Policy, restrict Zimbra access at the network perimeter, and enforce browser update policies through MDM or Group Policy.

Medium-Term Hardening (Within 30 Days)

  • Integrate the CISA KEV Catalog as a daily feed into your vulnerability management platform.
  • Implement patch SLAs tiered by source — KEV entries should carry the shortest remediation windows in your policy.
  • Conduct a tabletop exercise simulating exploitation of a KEV vulnerability to validate detection and response capabilities.
  • Review your security tool patch cadence and align it with your standard enterprise patch cycle.

Important: The KEV Catalog is freely available as a machine-readable JSON feed at cisa.gov/known-exploited-vulnerabilities-catalog. Most enterprise vulnerability management platforms support direct integration.


Key Takeaways

  • Act on KEV entries immediately — each entry represents confirmed, active exploitation, not theoretical risk.
  • Audit legacy systems — old vulnerabilities like CVE-2008-0015 remain active attack vectors against unpatched infrastructure.
  • Treat security tools as attack surface — patch ThreatSonar and similar platforms with the same urgency as any other enterprise software.
  • Integrate the KEV Catalog into your VM program — supplement CVSS scoring with KEV and EPSS data for operationally accurate prioritization.
  • Establish risk-tiered patch SLAs — KEV entries should trigger your fastest remediation track, regardless of CVSS score.

Conclusion

CISA's latest KEV Catalog update is more than a patch advisory — it signals where attackers are investing effort right now. From a 17-year-old ActiveX flaw to a new Chromium use-after-free, these vulnerabilities span the full breadth of enterprise attack surface. Federal agencies face hard remediation deadlines under BOD 22-01, but every organization should treat KEV entries as the highest-priority items in their vulnerability queue.

Start with asset discovery, apply available patches, and implement compensating controls where patching is delayed. Review the full KEV Catalog regularly — it is one of the most actionable threat intelligence resources available, and it costs nothing to use.


Frequently Asked Questions

Q: What is the CISA KEV Catalog?
A: The Known Exploited Vulnerabilities Catalog is a CISA-maintained list of CVEs with confirmed evidence of active exploitation. Updated continuously, it serves as a prioritization tool for vulnerability management across federal agencies and private sector organizations.

Q: Are private sector organizations required to patch KEV entries?
A: Binding Operational Directive 22-01 legally mandates remediation for FCEB agencies only. However, CISA strongly recommends all organizations prioritize KEV entries, as each represents a vulnerability actively used by threat actors.

Q: How quickly should organizations patch KEV vulnerabilities?
A: FCEB agencies have 2–3 weeks depending on the entry. For private sector teams, best practice suggests 7–14 day SLAs for KEV entries, with immediate compensating controls where patching is delayed.

Q: Why is a 2008 vulnerability still being actively exploited?
A: Legacy vulnerabilities persist in environments with poor asset visibility, deferred patching, or assumptions that old flaws are no longer targeted. Threat actors actively scan for unpatched legacy systems, making historical CVEs a sustained risk.

Q: Where can I access the CISA KEV Catalog?
A: The catalog is publicly available at cisa.gov/known-exploited-vulnerabilities-catalog as a machine-readable JSON feed. Most enterprise vulnerability management platforms support direct integration for automated prioritization.