【Vulnerability Alert】CISA Adds 8 Known Exploited Vulnerabilities to the KEV Catalog (2026/02/16–2026/02/22)
Source: Ministry of education information & communication security contingency platform
"" "" ""
| Publication Number | TACERT-ANA-2026022404024040 | Publication Time | 2026/02/24 16:45 |
| Incident Type | ANA-Vulnerability Alert | Discovery Time | 2026/02/24 16:45 |
| Impact Level | Low | ||
| [Subject] 【Vulnerability Alert】CISA Adds 8 Known Exploited Vulnerabilities to the KEV Catalog (2026/02/16–2026/02/22) |
|||
|
[Content] 【Ransomware Exploitation: Unknown】 Synacor Zimbra Collaboration Suite (ZCS) contains a Server-Side Request Forgery (SSRF) vulnerability when the WebEx zimlet is installed and the zimlet JSP is enabled. 【CVE-2024-7694】TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability (CVSS v3.1: 7.2) 【Ransomware Exploitation: Unknown】 The TeamT5 ThreatSonar Anti-Ransomware product does not implement sufficient content filtering for uploaded files. A remote attacker who has obtained administrative privileges on the product platform can upload malicious files and execute arbitrary system commands on the server through those files. 【CVE-2008-0015】Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability (CVSS v3.1: 8.8) 【Ransomware Exploitation: Unknown】 The Microsoft Windows Video ActiveX control contains a remote code execution vulnerability. An attacker can exploit this vulnerability by crafting a malicious webpage. When a user visits the webpage, it may result in remote code execution. A successful attacker may gain the same privileges as the logged-in user. 【CVE-2026-2441】Google Chromium CSS Use-After-Free Vulnerability (CVSS v3.1: 8.8) 【Ransomware Exploitation: Unknown】 Google Chromium contains a use-after-free vulnerability in CSS handling, which may allow a remote attacker to exploit heap corruption via a specially crafted HTML page. This vulnerability may affect multiple Chromium-based web browsers, including but not limited to Google Chrome, Microsoft Edge, and Opera. 【CVE-2021-22175】GitLab Server-Side Request Forgery (SSRF) Vulnerability (CVSS v3.1: 6.8) 【Ransomware Exploitation: Unknown】 GitLab contains a Server-Side Request Forgery (SSRF) vulnerability when Webhook requests to the internal network are enabled. 【CVE-2026-22769】Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability (CVSS v3.1: 10.0) 【Ransomware Exploitation: Unknown】 Dell RecoverPoint for Virtual Machines (RP4VMs) contains a hard-coded credentials vulnerability, which may allow an unauthenticated remote attacker to gain access to the underlying operating system and maintain persistent access. 【CVE-2025-49113】RoundCube Webmail Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 9.9) 【Ransomware Exploitation: Unknown】 RoundCube Webmail contains a deserialization of untrusted data vulnerability. Due to the failure of program/actions/settings/upload.php to properly validate the _from parameter in the URL, an authenticated user may exploit this vulnerability to execute arbitrary code remotely. 【CVE-2025-68461】RoundCube Webmail Cross-Site Scripting Vulnerability (CVSS v3.1: 7.2) 【Ransomware Exploitation: Unknown】 RoundCube Webmail contains a cross-site scripting (XSS) vulnerability. An attacker can exploit this vulnerability through the use of the animate tag in an SVG file." |
|||
|
[Affected Platform] 【CVE-2024-7694】ThreatSonar Anti-Ransomware version 3.4.5 and earlier (including 3.4.5). 【CVE-2008-0015】Please refer to the officially listed affected versions: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 【CVE-2026-2441】Please refer to the officially listed affected versions: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html 【CVE-2021-22175】Please refer to the officially listed affected versions: https://about.gitlab.com/releases/2021/02/11/security-release-gitlab-13-8-4-released/ 【CVE-2026-22769】Please refer to the officially listed affected versions: https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079 【CVE-2025-49113】Please refer to the officially listed affected versions: https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10 【CVE-2025-68461】Please refer to the officially listed affected versions: https://roundcube.net/news/2025/12/13/security-updates-1.6.12-and-1.5.12 |
|||
|
[Recommended Actions] 【CVE-2024-7694】 Please upgrade to version 3.5.0 or later (including 3.5.0), or apply Hotfix-20240715 to remediate the vulnerability. 【CVE-2008-0015】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037 【CVE-2026-2441】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html 【CVE-2021-22175】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://about.gitlab.com/releases/2021/02/11/security-release-gitlab-13-8-4-released/ 【CVE-2026-22769】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079 【CVE-2025-49113】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10 【CVE-2025-68461】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://roundcube.net/news/2025/12/13/security-updates-1.6.12-and-1.5.12 |
|||
| [Reference] |
|||
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw





