【Vulnerability Alert】CISA Adds Six Known Exploited Vulnerabilities to the KEV Catalog (2026/01/19–2026/01/25)

publish date : 2026-01-30 update date : 2026-01-30

Source: Ministry of education information & communication security contingency platform

"" "" ""

Publication Number TACERT-ANA-2026012808010202 Publication Time 2026/01/28 08:56
Incident Type ANA-Vulnerability Alert Discovery Time 2026/01/28 08:56
Impact Level Low  
[Subject]
【Vulnerability Alert】CISA Adds Six Known Exploited Vulnerabilities to the KEV Catalog (2026/01/19–2026/01/25)

[Content]
Forwarded from TWCERTCC-200-202601-00000024

【CVE-2026-20045】Cisco Unified Communications Products Code Injection Vulnerability (CVSS v3.1: 8.2)

【Whether Ransomware Exploitation Occurred: Unknown】 A code injection vulnerability exists in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance. This vulnerability may allow an attacker to gain user-level access to the underlying operating system and further escalate privileges to root.

【CVE-2025-68645】Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability (CVSS v3.1: 8.8)

【Whether Ransomware Exploitation Occurred: Unknown】 A PHP Remote File Inclusion vulnerability exists in Synacor Zimbra Collaboration Suite (ZCS). This vulnerability may allow a remote attacker to send specially crafted requests to the /h/rest endpoint, thereby affecting internal request dispatching and including arbitrary files within the WebRoot directory.

【CVE-2025-34026】Versa Concerto Improper Authentication Vulnerability (CVSS v3.1: 7.5)

【Whether Ransomware Exploitation Occurred: Unknown】 An improper authentication vulnerability exists in the Traefik reverse proxy configuration of the Versa Concerto SD-WAN orchestration platform, which may allow attackers to access management endpoints. Internal Actuator endpoints may be abused to obtain heap dumps and trace logs.

【CVE-2025-31125】Vite Vitejs Improper Access Control Vulnerability (CVSS v3.1: 5.3)

【Whether Ransomware Exploitation Occurred: Unknown】 An improper access control vulnerability exists in Vite Vitejs. Attackers may access unauthorized file contents via specific query parameters. Only applications that expose the Vite development server externally (using the --host or server.host configuration options) are affected.

【CVE-2025-54313】Prettier eslint-config-prettier Embedded Malicious Code Vulnerability (CVSS v3.1: 7.5)

【Whether Ransomware Exploitation Occurred: Unknown】 An embedded malicious code vulnerability exists in Prettier eslint-config-prettier. When installing the affected package, the system executes the install.js file, which launches the malicious program node-gyp.dll on Windows systems.

【CVE-2024-37079】Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability (CVSS v3.1: 9.8)

【Whether Ransomware Exploitation Occurred: Unknown】 An out-of-bounds write vulnerability exists in Broadcom VMware vCenter Server in its implementation of the DCERPC protocol. A malicious attacker with network access to the vCenter Server may send specially crafted network packets, potentially resulting in remote code execution."

(Information Sharing Level: WHITE (Information content can be publicly disclosed)

[Affected Platform]
【CVE-2026-20045】Please refer to the affected versions listed by the official source: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b

【CVE-2025-68645】Please refer to the affected versions listed by the official source: https://wiki.zimbra.com/wiki/Security_Center

【CVE-2025-34026】Please refer to the affected versions listed by the official source: https://security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e

【CVE-2025-31125】Please refer to the affected versions listed by the official source: https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8

【CVE-2025-54313】Please refer to the affected versions listed by the official source: https://github.com/advisories/GHSA-f29h-pxvx-f335

【CVE-2024-37079】Please refer to the affected versions listed by the official source: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453

[Recommended Actions]
【CVE-2026-20045】The vendor has released a patch for this vulnerability. Please update to the relevant versions: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b

【CVE-2025-68645】The vendor has released a patch for this vulnerability. Please update to the relevant versions: https://wiki.zimbra.com/wiki/Security_Center

【CVE-2025-34026】The vendor has released a patch for this vulnerability. Please update to the relevant versions: https://security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e

【CVE-2025-31125】The vendor has released a patch for this vulnerability. Please update to the relevant versions: https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8

【CVE-2025-54313】The vendor has released a patch for this vulnerability. Please update to the relevant versions: https://github.com/advisories/GHSA-f29h-pxvx-f335

【CVE-2024-37079】The vendor has released a patch for this vulnerability. Please update to the relevant versions: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453

[Reference]
 
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center