Jump to the main content block

【Vulnerability Alert】CISA Added 9 Known Exploited Vulnerabilities to the KEV Catalog (2026/03/16-2026/03/22)

publish date : 2026-03-27 update date : 2026-03-27

Source: Ministry of education information & communication security contingency platform

"" "" ""

Publication Number TACERT-ANA-2026032411033636 Publication Time 2026/03/24 11:38
Incident Type ANA-Vulnerability Alert Discovery Time 2026/03/24 11:38
Impact Level Low  
[Subject]
【Vulnerability Alert】CISA Added 9 Known Exploited Vulnerabilities to the KEV Catalog (2026/03/16-2026/03/22)
[Content]
Forwarded from TWCERTCC-200-202603-00000018

【CVE-2025-47813】Wing FTP Server Information Disclosure Vulnerability (CVSS v3.1: 4.3)
【Ransomware Exploitation: Unknown】 Wing FTP Server generates an error message containing sensitive information when a long value is used in the UID Cookie, thereby resulting in an information disclosure vulnerability.

【CVE-2025-66376】Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability (CVSS v3.1: 7.2)
【Ransomware Exploitation: Unknown】 The Classic UI of Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability, which attackers can exploit by abusing the Cascading Style Sheets (CSS) @import directive in email HTML.

【CVE-2026-20963】Microsoft SharePoint Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 8.8)
【Ransomware Exploitation: Unknown】 Microsoft SharePoint contains a deserialization of untrusted data vulnerability. An unauthorized attacker can execute code over the network.

【CVE-2026-20131】Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 10.0)
【Ransomware Exploitation: Yes】 Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in their web-based management interface, which may allow an unauthenticated remote attacker to execute arbitrary Java code with root privileges on an affected device.

【CVE-2025-32432】Craft CMS Code Injection Vulnerability (CVSS v3.1: 10.0)
【Ransomware Exploitation: Unknown】 Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.

【CVE-2025-54068】Laravel Livewire Code Injection Vulnerability (CVSS v3.1: 9.8)
【Ransomware Exploitation: Unknown】 Laravel Livewire contains a code injection vulnerability that may allow an unauthenticated attacker to achieve remote command execution under specific conditions.

【CVE-2025-43510】Apple Multiple Products Improper Locking Vulnerability (CVSS v3.1: 7.8)
【Ransomware Exploitation: Unknown】 Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability, which may allow a malicious app to cause unexpected modifications to memory shared between processes.

【CVE-2025-43520】Apple Multiple Products Classic Buffer Overflow Vulnerability (CVSS v3.1: 5.5)
【Ransomware Exploitation: Unknown】 Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability, which may allow a malicious app to cause an unexpected system termination or write to kernel memory.

【CVE-2025-31277】Apple Multiple Products Buffer Overflow Vulnerability (CVSS v3.1: 8.8)
【Ransomware Exploitation: Unknown】 Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability, which may allow the system to process maliciously crafted web content and consequently result in memory corruption.


(Information Sharing Level: WHITE (Information content can be publicly disclosed)
[Affected Platform]

【CVE-2025-47813】Versions prior to Wing FTP Server 7.4.4

【CVE-2025-66376】Please refer to the affected versions listed by the official source: https://wiki.zimbra.com/wiki/Security_Center

【CVE-2026-20963】Please refer to the affected versions listed by the official source: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963

【CVE-2026-20131】Please refer to the affected versions listed by the official source: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh

【CVE-2025-32432】Please refer to the affected versions listed by the official source: https://craftcms.com/knowledge-base/craft-cms-cve-2025-32432

【CVE-2025-54068】Please refer to the affected versions listed by the official source: https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3

【CVE-2025-43510】Please refer to the affected versions listed by the official source:
https://support.apple.com/en-us/125632
https://support.apple.com/en-us/125633
https://support.apple.com/en-us/125634
https://support.apple.com/en-us/125635
https://support.apple.com/en-us/125636
https://support.apple.com/en-us/125637
https://support.apple.com/en-us/125638
https://support.apple.com/en-us/125639

【CVE-2025-43520】Please refer to the affected versions listed by the official source:
https://support.apple.com/en-us/125632
https://support.apple.com/en-us/125633
https://support.apple.com/en-us/125634
https://support.apple.com/en-us/125635
https://support.apple.com/en-us/125636
https://support.apple.com/en-us/125637
https://support.apple.com/en-us/125638
https://support.apple.com/en-us/125639

【CVE-2025-31277】Please refer to the affected versions listed by the official source:
https://support.apple.com/en-us/124147
https://support.apple.com/en-us/124149
https://support.apple.com/en-us/124152
https://support.apple.com/en-us/124153
https://support.apple.com/en-us/124154
https://support.apple.com/en-us/124155

[Recommended Actions]

【CVE-2025-47813】Upgrade the corresponding product to the following version (or later): Wing FTP Server 7.4.4

【CVE-2025-66376】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://wiki.zimbra.com/wiki/Security_Center

【CVE-2026-20963】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963

【CVE-2026-20131】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh

【CVE-2025-32432】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://craftcms.com/knowledge-base/craft-cms-cve-2025-32432

【CVE-2025-54068】The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3

【CVE-2025-43510】The official vendor has released a security update to address this vulnerability. Please update to the relevant version:
https://support.apple.com/en-us/125632
https://support.apple.com/en-us/125633
https://support.apple.com/en-us/125634
https://support.apple.com/en-us/125635
https://support.apple.com/en-us/125636
https://support.apple.com/en-us/125637
https://support.apple.com/en-us/125638
https://support.apple.com/en-us/125639

【CVE-2025-43520】The official vendor has released a security update to address this vulnerability. Please update to the relevant version:
https://support.apple.com/en-us/125632
https://support.apple.com/en-us/125633
https://support.apple.com/en-us/125634
https://support.apple.com/en-us/125635
https://support.apple.com/en-us/125636
https://support.apple.com/en-us/125637
https://support.apple.com/en-us/125638
https://support.apple.com/en-us/125639

【CVE-2025-31277】The official vendor has released a security update to address this vulnerability. Please update to the relevant version:
https://support.apple.com/en-us/124147
https://support.apple.com/en-us/124149
https://support.apple.com/en-us/124152
https://support.apple.com/en-us/124153
https://support.apple.com/en-us/124154
https://support.apple.com/en-us/124155

[Reference]
0
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center
Click Num: