The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog, adding four new security flaws that have been confirmed to be under active exploitation by threat actors. The vulnerabilities impact a diverse set of widely deployed products: Google Chrome, Microsoft Windows, the Zimbra Collaboration Suite, and the ThreatSonar anti-ransomware platform. Inclusion in the KEV catalog is a significant event, as it triggers a Binding Operational Directive (BOD 22-01) that mandates all Federal Civilian Executive Branch (FCEB) agencies to remediate the vulnerabilities within a specific timeframe. CISA strongly urges all organizations, public and private, to prioritize these patches to defend against active threats.
While the specific CVE identifiers were not detailed in the provided summary, the affected products are as follows:
The addition of these vulnerabilities to the KEV catalog signifies a clear and present danger. CISA only adds flaws to this list when it has reliable evidence of active, real-world exploitation.
Remediation of these vulnerabilities should be treated with the highest priority, following a risk-based approach:
Organizations should follow the guidance provided by each respective vendor:
Before patches are applied, security teams can hunt for signs of exploitation:
chrome.exe.The primary mitigation for all KEVs is to apply the vendor-supplied patches within the mandated timeframe.
Organizations should run authenticated vulnerability scans to identify all instances of the affected software in their environment.
The most critical defensive action is to implement a rapid software update process for all vulnerabilities listed in the CISA KEV catalog. For the affected products—Google Chrome, Microsoft Windows, Zimbra, and ThreatSonar—this means immediately deploying the latest security patches provided by the vendors. Organizations should leverage automated patch management systems to ensure timely and comprehensive application. The priority should be on internet-facing systems like Zimbra, followed by operating systems and browsers. Since these vulnerabilities are under active exploitation, the risk of not patching is exceptionally high. This action directly addresses the weakness the attackers are abusing and is the primary remediation strategy mandated by CISA's directive.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats