Jump to the main content block

【Vulnerability Alert】CISA Adds 8 Known Exploited Vulnerabilities to the KEV Catalog (2026/02/16–2026/02/22)

publish date : 2026-02-26 update date : 2026-02-26

Source: Ministry of education information & communication security contingency platform

"" "" ""

Publication Number TACERT-ANA-2026022404024040 Publication Time 2026/02/24 16:45
Incident Type ANA-Vulnerability Alert Discovery Time 2026/02/24 16:45
Impact Level Low  
[Subject]
【Vulnerability Alert】CISA Adds 8 Known Exploited Vulnerabilities to the KEV Catalog (2026/02/16–2026/02/22)

[Content]
Forwarded from TWCERTCC-200-202602-00000010

【CVE-2020-7796】Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability (CVSS v3.1: 9.8)

【Ransomware Exploitation: Unknown】 Synacor Zimbra Collaboration Suite (ZCS) contains a Server-Side Request Forgery (SSRF) vulnerability when the WebEx zimlet is installed and the zimlet JSP is enabled.

【CVE-2024-7694】TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability (CVSS v3.1: 7.2)

【Ransomware Exploitation: Unknown】 The TeamT5 ThreatSonar Anti-Ransomware product does not implement sufficient content filtering for uploaded files. A remote attacker who has obtained administrative privileges on the product platform can upload malicious files and execute arbitrary system commands on the server through those files.

【CVE-2008-0015】Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability (CVSS v3.1: 8.8)

【Ransomware Exploitation: Unknown】 The Microsoft Windows Video ActiveX control contains a remote code execution vulnerability. An attacker can exploit this vulnerability by crafting a malicious webpage. When a user visits the webpage, it may result in remote code execution. A successful attacker may gain the same privileges as the logged-in user.

【CVE-2026-2441】Google Chromium CSS Use-After-Free Vulnerability (CVSS v3.1: 8.8)

【Ransomware Exploitation: Unknown】 Google Chromium contains a use-after-free vulnerability in CSS handling, which may allow a remote attacker to exploit heap corruption via a specially crafted HTML page. This vulnerability may affect multiple Chromium-based web browsers, including but not limited to Google Chrome, Microsoft Edge, and Opera.

【CVE-2021-22175】GitLab Server-Side Request Forgery (SSRF) Vulnerability (CVSS v3.1: 6.8)

【Ransomware Exploitation: Unknown】 GitLab contains a Server-Side Request Forgery (SSRF) vulnerability when Webhook requests to the internal network are enabled.

【CVE-2026-22769】Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability (CVSS v3.1: 10.0)

【Ransomware Exploitation: Unknown】 Dell RecoverPoint for Virtual Machines (RP4VMs) contains a hard-coded credentials vulnerability, which may allow an unauthenticated remote attacker to gain access to the underlying operating system and maintain persistent access.

【CVE-2025-49113】RoundCube Webmail Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 9.9)

【Ransomware Exploitation: Unknown】 RoundCube Webmail contains a deserialization of untrusted data vulnerability. Due to the failure of program/actions/settings/upload.php to properly validate the _from parameter in the URL, an authenticated user may exploit this vulnerability to execute arbitrary code remotely.

【CVE-2025-68461】RoundCube Webmail Cross-Site Scripting Vulnerability (CVSS v3.1: 7.2)

【Ransomware Exploitation: Unknown】 RoundCube Webmail contains a cross-site scripting (XSS) vulnerability. An attacker can exploit this vulnerability through the use of the animate tag in an SVG file."

(Information Sharing Level: WHITE (Information content can be publicly disclosed)

[Affected Platform]
【CVE-2020-7796】Please refer to the officially listed affected versions: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7

【CVE-2024-7694】ThreatSonar Anti-Ransomware version 3.4.5 and earlier (including 3.4.5).

【CVE-2008-0015】Please refer to the officially listed affected versions: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037

【CVE-2026-2441】Please refer to the officially listed affected versions: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html

【CVE-2021-22175】Please refer to the officially listed affected versions: https://about.gitlab.com/releases/2021/02/11/security-release-gitlab-13-8-4-released/

【CVE-2026-22769】Please refer to the officially listed affected versions: https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079

【CVE-2025-49113】Please refer to the officially listed affected versions: https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10

【CVE-2025-68461】Please refer to the officially listed affected versions: https://roundcube.net/news/2025/12/13/security-updates-1.6.12-and-1.5.12

[Recommended Actions]
【CVE-2020-7796】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7

【CVE-2024-7694】 Please upgrade to version 3.5.0 or later (including 3.5.0), or apply Hotfix-20240715 to remediate the vulnerability.

【CVE-2008-0015】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-037

【CVE-2026-2441】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html

【CVE-2021-22175】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://about.gitlab.com/releases/2021/02/11/security-release-gitlab-13-8-4-released/

【CVE-2026-22769】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079

【CVE-2025-49113】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10

【CVE-2025-68461】 The vendor has released a security update to address this vulnerability. Please upgrade to the relevant patched version: https://roundcube.net/news/2025/12/13/security-updates-1.6.12-and-1.5.12

[Reference]
 
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center
Click Num: