Jump to the main content block

【Vulnerability Alert】CISA Added 9 Known Exploited Vulnerabilities to the KEV Catalog (2026/04/06-2026/04/12)

publish date : 2026-04-17 update date : 2026-04-16

Source: Ministry of education information & communication security contingency platform

"" "" ""

Publication Number TACERT-ANA-2026041504040303 Publication Time 2026/04/15 16:27
Incident Type ANA-Vulnerability Alert Discovery Time 2026/04/15 16:27
Impact Level Low  
[Subject]
【Vulnerability Alert】CISA Added 9 Known Exploited Vulnerabilities to the KEV Catalog (2026/04/06-2026/04/12)
[Content]
Forwarded from TWCERTCC-200-202604-00000013

【CVE-2026-35616】Fortinet FortiClient EMS Improper Access Control Vulnerability (CVSS v3.1: 9.8)
【Ransomware Exploitation Status: Unknown】 Fortinet FortiClient EMS contains an improper access control vulnerability, which may allow an unauthenticated attacker to execute unauthorized code or commands through specially crafted requests.

【CVE-2026-1340】Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability (CVSS v3.1: 9.8)
【Ransomware Exploitation Status: Unknown】 Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability, which may allow an attacker to achieve remote code execution without authentication.

【CVE-2012-1854】Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability (CVSS v3.1: 7.8)
【Ransomware Exploitation Status: Unknown】 Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability, which may allow remote code execution.

【CVE-2025-60710】Microsoft Windows Link Following Vulnerability (CVSS v3.1: 7.8)
【Ransomware Exploitation Status: Unknown】 Microsoft Windows contains a link following vulnerability, which may lead to privilege escalation.

【CVE-2023-21529】Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 8.8)
【Ransomware Exploitation Status: Unknown】 Microsoft Exchange Server contains a deserialization of untrusted data vulnerability, which may allow an authenticated attacker to execute remote code.

【CVE-2023-36424】Microsoft Windows Out-of-Bounds Read Vulnerability (CVSS v3.1: 7.8)
【Ransomware Exploitation Status: Unknown】 The Microsoft Windows Common Log File System driver contains an out-of-bounds read vulnerability, which may allow a threat actor to escalate privileges.

【CVE-2020-9715】Adobe Acrobat Use-After-Free Vulnerability (CVSS v3.1: 7.8)
【Ransomware Exploitation Status: Unknown】 Adobe Acrobat contains a use-after-free vulnerability, which may allow code execution.

【CVE-2026-21643】Fortinet SQL Injection Vulnerability (CVSS v3.1: 9.8)
【Ransomware Exploitation Status: Unknown】 Fortinet FortiClient EMS contains an SQL injection vulnerability, which may allow an unauthenticated attacker to execute unauthorized code or commands through specially crafted HTTP requests.

【CVE-2026-34621】Adobe Acrobat and Reader Prototype Pollution Vulnerability (CVSS v3.1: 8.6)
【Ransomware Exploitation Status: Unknown】 Adobe Acrobat and Reader contain a prototype pollution vulnerability, which may allow arbitrary code execution.


(Information Sharing Level: WHITE (Information content can be publicly disclosed)
[Affected Platform]
 

【CVE-2026-35616】Please refer to the affected versions listed by the official vendor: https://fortiguard.fortinet.com/psirt/FG-IR-26-099

【CVE-2026-1340】Please refer to the affected versions listed by the official vendor: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340

【CVE-2012-1854】Please refer to the affected versions listed by the official vendor: https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-046

【CVE-2025-60710】Please refer to the affected versions listed by the official vendor: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710

【CVE-2023-21529】Please refer to the affected versions listed by the official vendor: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529

【CVE-2023-36424】Please refer to the affected versions listed by the official vendor: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424

【CVE-2020-9715】Please refer to the affected versions listed by the official vendor: https://helpx.adobe.com/security/products/acrobat/apsb20-48.html

【CVE-2026-21643】Please refer to the affected versions listed by the official vendor: https://fortiguard.fortinet.com/psirt/FG-IR-25-1142

【CVE-2026-34621】Please refer to the affected versions listed by the official vendor: https://helpx.adobe.com/security/products/acrobat/apsb26-43.html

[Recommended Actions]

【CVE-2026-35616】 The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://fortiguard.fortinet.com/psirt/FG-IR-26-099

【CVE-2026-1340】 The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340

【CVE-2012-1854】 The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-046

【CVE-2025-60710】 The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710

【CVE-2023-21529】 The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529

【CVE-2023-36424】 The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424

【CVE-2020-9715】 The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://helpx.adobe.com/security/products/acrobat/apsb20-48.html

【CVE-2026-21643】 The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://fortiguard.fortinet.com/psirt/FG-IR-25-1142

【CVE-2026-34621】 The official vendor has released a security update to address this vulnerability. Please update to the relevant version: https://helpx.adobe.com/security/products/acrobat/apsb26-43.html

[Reference]
 
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center
Click Num: