【Vulnerability Alert】CISA Added 6 Known Exploited Vulnerabilities to the KEV Catalog (2026/03/09–2026/03/15)
Source: Ministry of education information & communication security contingency platform
"" "" ""
| Publication Number | TACERT-ANA-2026031701031414 | Publication Time | 2026/03/17 13:13 |
| Incident Type | ANA-Vulnerability Alert | Discovery Time | 2026/03/17 13:13 |
| Impact Level | Low | ||
| [Subject] 【Vulnerability Alert】CISA Added 6 Known Exploited Vulnerabilities to the KEV Catalog (2026/03/09–2026/03/15) |
|||
| [Content] Forwarded from TWCERTCC-200-202603-00000014 【CVE-2021-22054】Omnissa Workspace ONE Server-Side Request Forgery Vulnerability (CVSS v3.1: 7.5) 【CVE-2025-26399】SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 9.8) 【CVE-2026-1603】Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability (CVSS v3.1: 8.6) 【CVE-2025-68613】n8n Improper Control of Dynamically-Managed Code Resources Vulnerability (CVSS v3.1: 9.9) 【CVE-2026-3910】Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability (CVSS v3.1: 8.8) 【CVE-2026-3909】Google Skia Out-of-Bounds Write Vulnerability (CVSS v3.1: 8.8) (Information Sharing Level: WHITE (Information content can be publicly disclosed) |
|||
| [Affected Platform]
【CVE-2021-22054】Please refer to the affected versions listed by the official advisory: 【CVE-2025-26399】Please refer to the affected versions listed by the official advisory: 【CVE-2026-1603】Please refer to the affected versions listed by the official advisory: 【CVE-2025-68613】Please refer to the affected versions listed by the official advisory: 【CVE-2026-3910】Please refer to the affected versions listed by the official advisory: 【CVE-2026-3909】Please refer to the affected versions listed by the official advisory: |
|||
| [Recommended Actions]
【CVE-2021-22054】 The vendor has released a remediation update for the vulnerability. Please update to the relevant version. 【CVE-2025-26399】 The vendor has released a remediation update for the vulnerability. Please update to the relevant version. 【CVE-2026-1603】 The vendor has released a remediation update for the vulnerability. Please update to the relevant version. 【CVE-2025-68613】 The vendor has released a remediation update for the vulnerability. Please update to the relevant version. 【CVE-2026-3910】 The vendor has released a remediation update for the vulnerability. Please update to the relevant version. 【CVE-2026-3909】 The vendor has released a remediation update for the vulnerability. Please update to the relevant version. |
|||
| [Reference] |
|||
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw





