【Vulnerability Alert】CISA added 3 known exploited vulnerabilities to the KEV Catalog (2026/05/04-2026/05/10)

publish date : 2026-05-15 update date : 2026-05-15

Source: Ministry of education information & communication security contingency platform

"" "" ""

Publication Number TACERT-ANA-2026051405050404 Publication Time 2026-05-14 17:01:05
Incident Type ANA-Vulnerability Alert Discovery Time 2026-05-14 17:01:05
Impact Level Low  
[Subject]
【Vulnerability Alert】CISA added 3 known exploited vulnerabilities to the KEV Catalog (2026/05/04-2026/05/10)
[Content]

Forwarded from TWCERTCC-200-202605-00000010

【CVE-2026-0300】Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability (CVSS v3.1: 9.8)
【Whether exploited by ransomware: Unknown】 Palo Alto Networks’ PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal service. An unauthenticated attacker can execute arbitrary code with root privileges on PA-Series and VM-Series firewalls by sending specially crafted packets.

【CVE-2026-6973】Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability (CVSS v3.1: 7.2)
【Whether exploited by ransomware: Unknown】 Ivanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability. A remote authenticated user with administrator privileges can exploit this vulnerability to achieve remote code execution.

【CVE-2026-42208】BerriAI LiteLLM SQL Injection Vulnerability (CVSS v3.1: 9.8)
【Whether exploited by ransomware: Unknown】 BerriAI LiteLLM contains an SQL injection vulnerability. An attacker can exploit this vulnerability to read data from the proxy server’s database and may perform tampering, resulting in unauthorized access to the proxy server and the credentials it manages.

Information Sharing Level: WHITE (The information content is information that may be publicly disclosed)

[Affected Platform]

【CVE-2026-0300】Please refer to the affected versions listed by the official source https://security.paloaltonetworks.com/CVE-2026-0300

【CVE-2026-6973】Please refer to the affected versions listed by the official source https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs

【CVE-2026-42208】Please refer to the affected versions listed by the official source https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc

[Recommended Actions]

【CVE-2026-0300】The official source has released a fix update for the vulnerability. Please update to the relevant version
https://security.paloaltonetworks.com/CVE-2026-0300

【CVE-2026-6973】The official source has released a fix update for the vulnerability. Please update to the relevant version
https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs

【CVE-2026-42208】The official source has released a fix update for the vulnerability. Please update to the relevant version
https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc

[Reference]

(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center