CISA Adds Four Actively Exploited Flaws in Chrome, Windows, Zimbra to KEV Catalog

CISA Mandates Patching for Four New Known Exploited Vulnerabilities

HIGH
February 19, 2026
4m read
Patch ManagementVulnerabilityRegulatory

Related Entities

Products & Tech

Google ChromeMicrosoft WindowsZimbra Collaboration SuiteThreatSonar

Full Report

Executive Summary

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog, adding four new security flaws that have been confirmed to be under active exploitation by threat actors. The vulnerabilities impact a diverse set of widely deployed products: Google Chrome, Microsoft Windows, the Zimbra Collaboration Suite, and the ThreatSonar anti-ransomware platform. Inclusion in the KEV catalog is a significant event, as it triggers a Binding Operational Directive (BOD 22-01) that mandates all Federal Civilian Executive Branch (FCEB) agencies to remediate the vulnerabilities within a specific timeframe. CISA strongly urges all organizations, public and private, to prioritize these patches to defend against active threats.


Vulnerabilities Addressed

While the specific CVE identifiers were not detailed in the provided summary, the affected products are as follows:

  • Google Chrome: A vulnerability in the world's most popular web browser. These flaws are often exploited via malicious websites to achieve remote code execution on a visitor's machine.
  • Microsoft Windows: A flaw within the Windows operating system. Depending on the specific component, this could be used for privilege escalation, remote code execution, or denial of service.
  • Zimbra Collaboration Suite: A vulnerability in the popular email and collaboration platform. Flaws in internet-facing systems like Zimbra are high-value targets for attackers seeking initial access to a corporate network and sensitive email data.
  • ThreatSonar: A flaw in an anti-ransomware security product. Vulnerabilities in security tools are particularly dangerous as they can be used to disable defenses or can be exploited with high privileges.

Impact Assessment

The addition of these vulnerabilities to the KEV catalog signifies a clear and present danger. CISA only adds flaws to this list when it has reliable evidence of active, real-world exploitation.

  • Immediate Risk: Any organization using unpatched versions of these products is at immediate risk of compromise by threat actors who are already using these exploits in their campaigns.
  • High-Value Targets: The list includes a web browser, an operating system, and a collaboration suite, which are ubiquitous in enterprise environments. This provides attackers with a broad and rich target surface.
  • Federal Mandate: For U.S. federal agencies, patching is not optional. Failure to comply with the BOD deadline can result in censure and indicates a failure in basic cybersecurity hygiene.
  • Industry Benchmark: The KEV catalog serves as a de facto priority list for all security teams. If CISA is mandating that federal agencies patch a flaw, it should be considered a top priority for any responsible organization.

Deployment Priority

Remediation of these vulnerabilities should be treated with the highest priority, following a risk-based approach:

  1. Internet-Facing Systems: Any affected systems exposed to the internet, such as Zimbra servers, should be patched immediately. These are the most likely to be targeted by opportunistic, widespread scanning and exploitation.
  2. Critical Systems & High-Value Users: Patch critical servers, domain controllers, and the workstations of privileged users (e.g., executives, system administrators) next.
  3. General User Population: Follow with a general rollout of the patches for the user population (e.g., Chrome and Windows updates).

Installation Instructions

Organizations should follow the guidance provided by each respective vendor:

  • Google Chrome: Updates are typically applied automatically, but enterprise administrators should ensure their fleet management policies push the update and that users restart their browsers to apply it.
  • Microsoft Windows: Patches are delivered via Windows Update. Administrators should use Windows Server Update Services (WSUS), Microsoft Endpoint Configuration Manager (MECM), or equivalent tools to deploy the patches in a controlled manner.
  • Zimbra & ThreatSonar: Administrators should consult the vendors' security advisories for specific patch instructions and download links.

Cyber Observables

Before patches are applied, security teams can hunt for signs of exploitation:

  • Zimbra: Monitor web server logs for unusual requests to login pages or API endpoints. Check for the creation of suspicious files (e.g., web shells) in the webroot directory.
  • Windows: Monitor security event logs for anomalous process creation or privilege escalation events (e.g., Event ID 4688 and 4672).
  • Chrome: Analyze proxy logs for connections to known malicious domains or IP addresses. EDR logs can show suspicious child processes being spawned by chrome.exe.

Timeline of Events

1
February 19, 2026
CISA adds four new vulnerabilities affecting Chrome, Windows, Zimbra, and ThreatSonar to its Known Exploited Vulnerabilities (KEV) catalog.
2
February 19, 2026
This article was published

MITRE ATT&CK Mitigations

The primary mitigation for all KEVs is to apply the vendor-supplied patches within the mandated timeframe.

Organizations should run authenticated vulnerability scans to identify all instances of the affected software in their environment.

D3FEND Defensive Countermeasures

The most critical defensive action is to implement a rapid software update process for all vulnerabilities listed in the CISA KEV catalog. For the affected products—Google Chrome, Microsoft Windows, Zimbra, and ThreatSonar—this means immediately deploying the latest security patches provided by the vendors. Organizations should leverage automated patch management systems to ensure timely and comprehensive application. The priority should be on internet-facing systems like Zimbra, followed by operating systems and browsers. Since these vulnerabilities are under active exploitation, the risk of not patching is exceptionally high. This action directly addresses the weakness the attackers are abusing and is the primary remediation strategy mandated by CISA's directive.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CISAKEVvulnerabilityexploitationpatch managementGoogle ChromeMicrosoft WindowsZimbra

📢 Share This Article

Help others stay informed about cybersecurity threats