On April 20, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, signaling that each is being actively exploited in the wild. This action falls under Binding Operational Directive (BOD) 22-01, which mandates that Federal Civilian Executive Branch (FCEB) agencies remediate these flaws within a specified timeframe to protect federal networks. The vulnerabilities span multiple vendors, including Cisco, PaperCut, JetBrains, Kentico, Quest, and Synacor. The diversity of the affected products—from SD-WAN managers to print management software and collaboration suites—underscores the broad attack surface that threat actors are targeting. CISA strongly urges all organizations, not just federal agencies, to review their exposure to these vulnerabilities and prioritize patching immediately to prevent potential compromise.
The eight vulnerabilities added to the KEV catalog represent a variety of attack vectors and impact types. While some are recent, others are older flaws that have seen a resurgence in exploitation.
The active exploitation of these vulnerabilities poses a significant and immediate risk to organizations. Successful exploitation can lead to a range of severe consequences, including unauthorized network access, privilege escalation, data exfiltration, and deployment of ransomware. For FCEB agencies, failure to comply with the BOD 22-01 directive to patch these flaws can result in being disconnected from the federal network. For private sector organizations, a breach stemming from these vulnerabilities can cause major financial losses, reputational damage, and operational disruption. The targeting of infrastructure management tools like Cisco SD-WAN Manager, JetBrains TeamCity, and Quest KACE is particularly concerning, as a compromise of these systems can provide attackers with broad access to an organization's most critical assets.
The following patterns may help identify vulnerable or compromised systems:
/SETUP/papercut-updates.php/app/rest/users/id:1/tokens/RPC2TeamCity_server.exeSD-WAN Manager LogsZimbra/conf/Security teams should immediately take the following steps:
../), or unauthorized access attempts related to the affected products. This can be aided by D3FEND Network Traffic Analysis (D3-NTA).Remediation of these vulnerabilities is critical and should be prioritized.
Applying vendor-supplied patches is the most direct way to remediate these vulnerabilities.
Restrict access to the management interfaces of affected applications to only trusted IP addresses and internal networks.
Implement robust logging and monitoring for affected applications to detect and alert on potential exploitation attempts.
Use a Web Application Firewall (WAF) to filter malicious requests like path traversal and XSS before they reach the application.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats