【Vulnerability Alert】CISA Added 9 Known Exploited Vulnerabilities to the KEV Catalog (2026/03/16-2026/03/22)
Source: Ministry of education information & communication security contingency platform
"" "" ""
| Publication Number | TACERT-ANA-2026032411033636 | Publication Time | 2026/03/24 11:38 |
| Incident Type | ANA-Vulnerability Alert | Discovery Time | 2026/03/24 11:38 |
| Impact Level | Low | ||
| [Subject] 【Vulnerability Alert】CISA Added 9 Known Exploited Vulnerabilities to the KEV Catalog (2026/03/16-2026/03/22) |
|||
| [Content] Forwarded from TWCERTCC-200-202603-00000018 【CVE-2025-47813】Wing FTP Server Information Disclosure Vulnerability (CVSS v3.1: 4.3) 【CVE-2025-66376】Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability (CVSS v3.1: 7.2) 【CVE-2026-20963】Microsoft SharePoint Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 8.8) 【CVE-2026-20131】Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 10.0) 【CVE-2025-32432】Craft CMS Code Injection Vulnerability (CVSS v3.1: 10.0) 【CVE-2025-54068】Laravel Livewire Code Injection Vulnerability (CVSS v3.1: 9.8) 【CVE-2025-43510】Apple Multiple Products Improper Locking Vulnerability (CVSS v3.1: 7.8) 【CVE-2025-43520】Apple Multiple Products Classic Buffer Overflow Vulnerability (CVSS v3.1: 5.5) 【CVE-2025-31277】Apple Multiple Products Buffer Overflow Vulnerability (CVSS v3.1: 8.8) (Information Sharing Level: WHITE (Information content can be publicly disclosed) |
|||
| [Affected Platform]
【CVE-2025-47813】Versions prior to Wing FTP Server 7.4.4 【CVE-2025-66376】Please refer to the affected versions listed by the official source: https://wiki.zimbra.com/wiki/Security_Center 【CVE-2026-20963】Please refer to the affected versions listed by the official source: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963 【CVE-2026-20131】Please refer to the affected versions listed by the official source: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh 【CVE-2025-32432】Please refer to the affected versions listed by the official source: https://craftcms.com/knowledge-base/craft-cms-cve-2025-32432 【CVE-2025-54068】Please refer to the affected versions listed by the official source: https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3 【CVE-2025-43510】Please refer to the affected versions listed by the official source: 【CVE-2025-43520】Please refer to the affected versions listed by the official source: 【CVE-2025-31277】Please refer to the affected versions listed by the official source: |
|||
| [Recommended Actions]
【CVE-2025-47813】Upgrade the corresponding product to the following version (or later): Wing FTP Server 7.4.4 【CVE-2025-66376】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://wiki.zimbra.com/wiki/Security_Center 【CVE-2026-20963】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963 【CVE-2026-20131】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh 【CVE-2025-32432】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://craftcms.com/knowledge-base/craft-cms-cve-2025-32432 【CVE-2025-54068】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3 【CVE-2025-43510】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: 【CVE-2025-43520】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: 【CVE-2025-31277】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: |
|||
| [Reference] 0 |
|||
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw





