Jump to the main content block

【Vulnerability Alert】CISA Adds Seven Known Exploited Vulnerabilities to the KEV Catalog (2026/01/26–2026/02/01)

publish date : 2026-02-06 update date : 2026-02-06

Source: Ministry of education information & communication security contingency platform

"" "" ""

Publication Number TACERT-ANA-2026020302024747 Publication Time 2026/02/03 14:52
Incident Type ANA-Vulnerability Alert Discovery Time 2026/02/03 14:52
Impact Level Low  
[Subject]
【Vulnerability Alert】CISA Adds Seven Known Exploited Vulnerabilities to the KEV Catalog (2026/01/26–2026/02/01)

[Content]
Forwarded from TWCERTCC-200-202602-00000001

【CVE-2018-14634】Linux Kernel Integer Overflow Vulnerability (CVSS v3.1: 7.8)

【Whether Ransomware Exploitation Occurred: Unknown】 An integer overflow vulnerability exists in the create_elf_tables() function in the Linux Kernel. This vulnerability may allow an unprivileged local user with access to SUID (or other privileged) binaries to escalate privileges.

【CVE-2025-52691】SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability (CVSS v3.1: 10.0)

【Whether Ransomware Exploitation Occurred: Unknown】 An unrestricted upload of file with dangerous type vulnerability exists in SmarterTools SmarterMail. This vulnerability may allow unauthenticated attackers to upload arbitrary files to any location on the mail server, potentially leading to remote code execution.

【CVE-2026-23760】SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability (CVSS v3.1: 9.8)

【Whether Ransomware Exploitation Occurred: Unknown】 An authentication bypass vulnerability exists in the password reset API of SmarterTools SmarterMail. The force-reset-password endpoint allows anonymous requests and does not verify the existing password or reset token when resetting the system administrator account. An unauthenticated attacker only needs to provide the target administrator username and a new password to reset the account, thereby resulting in full compromise of the SmarterMail instance.

【CVE-2026-24061】GNU InetUtils Argument Injection Vulnerability (CVSS v3.1: 9.8)

【Whether Ransomware Exploitation Occurred: Unknown】 An argument injection vulnerability exists in telnetd of GNU InetUtils. An attacker can set the USER environment variable to “-f root” to achieve remote authentication bypass.

【CVE-2026-21509】Microsoft Office Security Feature Bypass Vulnerability (CVSS v3.1: 7.8)

【Whether Ransomware Exploitation Occurred: Unknown】 A security feature bypass vulnerability exists in Microsoft Office. This vulnerability stems from reliance on untrusted input during security decision-making, which may allow unauthorized attackers to bypass local security protection mechanisms. Some affected products may have reached End of Life (EoL) and/or End of Service (EoS). Users are advised to stop using these products and migrate to supported versions. 【CVE-2026-24858】Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability (CVSS v3.1: 9.8)

【Whether Ransomware Exploitation Occurred: Unknown】 An authentication bypass vulnerability exists in Fortinet FortiAnalyzer, FortiManager, FortiOS, and FortiProxy. When FortiCloud SSO authentication is enabled on affected devices, attackers who possess a FortiCloud account and registered devices may log in to devices that are registered under other accounts.

【CVE-2026-1281】Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability (CVSS v3.1: 9.8)

【Whether Ransomware Exploitation Occurred: Unknown】 A code injection vulnerability exists in Ivanti Endpoint Manager Mobile (EPMM), which may allow attackers to achieve remote code execution without authentication."

(Information Sharing Level: WHITE (Information content can be publicly disclosed)

[Affected Platform]
【CVE-2018-14634】

Linux kernel versions 2.6.0 to 2.6.39.4

Linux kernel versions 3.10 to 3.10.102

Linux kernel versions 4.14 to 4.14.54

【CVE-2025-52691】 SmarterTools SmarterMail versions prior to Build 9413

【CVE-2026-23760】 SmarterTools SmarterMail versions prior to Build 9511

【CVE-2026-24061】 Please refer to the affected versions listed in the official advisory:

https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html

【CVE-2026-21509】 Please refer to the affected versions listed in the official advisory:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509

【CVE-2026-24858】 Please refer to the affected versions listed in the official advisory: https://fortiguard.fortinet.com/psirt/FG-IR-26-060

【CVE-2026-1281】 Please refer to the affected versions listed in the official advisory:

https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340"

[Recommended Actions]
【CVE-2018-14634】 System administrators should consult the product vendor to confirm whether their Linux operating system is affected. If a patch has been made available, administrators should follow the product vendor’s recommendations and take immediate action to mitigate the risk.

【CVE-2025-52691】 Upgrade the affected product to the following version (or later): SmarterMail Build 9413

【CVE-2026-23760】 Upgrade the affected product to the following version (or later): SmarterMail Build 9511

【CVE-2026-24061】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory:

https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html

【CVE-2026-21509】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509

【CVE-2026-24858】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory:

https://fortiguard.fortinet.com/psirt/FG-IR-26-060

【CVE-2026-1281】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory:

https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340

[Reference]
 
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center
Click Num: