Jump to the main content block

【Security Advisory】CISA Adds 6 Known Exploited Vulnerabilities to the KEV Catalog (2026/02/02-2026/02/08)

publish date : 2026-02-24 update date : 2026-02-24

Source: Ministry of education information & communication security contingency platform

"" "" ""

Publication Number TACERT-ANA-2026021002022424 Publication Time 2026/02/10 14:15
Incident Type ANA-Vulnerability Alert Discovery Time 2026/02/10 14:15
Impact Level Low  
[Subject]
【Security Advisory】CISA Adds 6 Known Exploited Vulnerabilities to the KEV Catalog (2026/02/02-2026/02/08)

[Content]
Forwarded from TWCERTCC-200-202602-00000005

【CVE-2021-39935】GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability (CVSS v3.1: 6.8)

【Exploited by Ransomware: Unknown】 GitLab Community and Enterprise Editions contain a Server-Side Request Forgery (SSRF) vulnerability that may allow an unauthorized external user to perform server-side requests via the CI Lint API.

【CVE-2025-64328】Sangoma FreePBX OS Command Injection Vulnerability (CVSS v3.1: 7.2)

【Exploited by Ransomware: Unknown】 Sangoma FreePBX Endpoint Manager contains an OS command injection vulnerability. An authenticated, known user may inject commands via the testconnection - check_ssh_connect() function, thereby remotely accessing the system with asterisk user privileges.

【CVE-2019-19006】Sangoma FreePBX Improper Authentication Vulnerability (CVSS v3.1: 9.8)

【Exploited by Ransomware: Unknown】 Sangoma FreePBX contains an improper authentication vulnerability that may allow an unauthorized user to bypass the password authentication mechanism and gain access to services provided by the FreePBX administrative interface.

【CVE-2025-40551】SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 9.8) 【Exploited by Ransomware: Unknown】 SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that may lead to remote code execution, allowing an attacker to execute arbitrary commands on the host system.

【CVE-2025-11953】React Native Community CLI OS Command Injection Vulnerability (CVSS v3.1: 9.8)

【Exploited by Ransomware: Unknown】 React Native Community CLI contains an OS command injection vulnerability that may allow an unauthenticated network attacker to send POST requests to the Metro Development Server and execute arbitrary executables through exposed vulnerable endpoints. In a Windows environment, the attacker may also execute arbitrary shell commands with fully controllable parameters.

【CVE-2026-24423】SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability (CVSS v3.1: 9.8)

【Exploited by Ransomware: Yes】 The ConnectToHub API method in SmarterTools SmarterMail contains a missing authentication for critical function vulnerability. This may allow an attacker to direct a SmarterMail instance to a malicious HTTP server, potentially resulting in the execution of malicious operating system commands."

(Information Sharing Level: WHITE (Information content can be publicly disclosed)

[Affected Platform]
【CVE-2021-39935】 Please refer to the affected versions listed in the official advisory: https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/

【CVE-2025-64328】 Please refer to the affected versions listed in the official advisory: https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw

【CVE-2019-19006】 FreePBX versions 13.0.0.0 to 13.0.197.13 (including 13.0.197.13) FreePBX versions 14.0.0.0 to 14.0.13.11 (including 14.0.13.11) FreePBX versions 15.0.0.0 to 15.0.16.26 (including 15.0.16.26)

【CVE-2025-40551】 Please refer to the affected versions listed in the official advisory: https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40551

【CVE-2025-11953】 Please refer to the affected versions listed in the official advisory: https://github.com/advisories/GHSA-399j-vxmf-hjvr

【CVE-2026-24423】 SmarterMail versions prior to Build 9511

[Recommended Actions]
【CVE-2021-39935】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory:

https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/

【CVE-2025-64328】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory:

https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw

【CVE-2019-19006】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory:

https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-001/62772

【CVE-2025-40551】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory:

https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40551

【CVE-2025-11953】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory:

https://github.com/advisories/GHSA-399j-vxmf-hjvr

【CVE-2026-24423】 Upgrade the affected product to the following version (or later): SmarterMail Build 9511

[Reference]
 
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center
Click Num: