The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog, adding six security flaws that are being actively exploited by threat actors in the wild. This update serves as a critical warning to all organizations to prioritize patching these specific vulnerabilities. The additions include a critical SQL injection vulnerability in Fortinet FortiClient EMS (CVE-2026-21643) and a remote code execution flaw in Adobe Acrobat Reader (CVE-2020-9715). The inclusion in the KEV catalog mandates that Federal Civilian Executive Branch (FCEB) agencies apply patches by April 27, 2026. Private sector organizations are strongly advised to follow suit to protect their networks from known, active threats.
This KEV update highlights a mix of modern and legacy vulnerabilities across different vendors, demonstrating that attackers will exploit any available weakness.
The other four vulnerabilities added were not detailed in the source articles but also target widely used software from vendors including Microsoft.
By definition, every vulnerability in the KEV catalog has confirmed evidence of active exploitation. The inclusion of CVE-2020-9715, a flaw from 2020, is a stark reminder that attackers have a long memory. They continue to scan for and exploit older, unpatched vulnerabilities, preying on organizations with poor patch management hygiene. The Fortinet flaw, being more recent and critical, is likely being exploited by a wide range of actors, from sophisticated APTs to ransomware groups, to gain initial access to corporate networks.
Hunting for exploitation of these vulnerabilities requires log analysis and endpoint monitoring.
For CVE-2026-21643 (Fortinet):
| Type | Value | Description |
|---|---|---|
| url_pattern | Requests with SQL syntax | Monitor FortiClient EMS web logs for HTTP requests containing SQL keywords like UNION, SELECT, char(), or ' in unusual places. |
| process_name | Fms.exe |
Monitor the main FortiClient EMS process for anomalous behavior, such as spawning shell processes (cmd.exe, powershell.exe). |
For CVE-2020-9715 (Adobe):
| Type | Value | Description |
|---|---|---|
| process_name | AcroRd32.exe |
Monitor the Adobe Reader process for suspicious child processes, network connections to unknown domains, or attempts to write files to disk. |
| file_name | *.pdf |
Suspicious PDF files received via email should be opened in a sandboxed environment for analysis. |
AcroRd32.exe. It should not be spawning command shells or making unexpected network connections. This is a direct application of D3-PA: Process Analysis.D3-SU: Software Update.The primary mitigation is to apply the security patches provided by the vendors for all listed CVEs.
Use a vulnerability scanner to identify all assets affected by these vulnerabilities and use the KEV catalog to prioritize remediation.
The CISA KEV catalog is a gift to defenders. It provides a clear, prioritized, and actionable list of vulnerabilities that require immediate attention. For CVE-2026-21643 and CVE-2020-9715, the primary and most effective countermeasure is a robust and rapid software update process. Organizations must have an asset inventory that can quickly identify all instances of Fortinet FortiClient EMS and Adobe Acrobat Reader. Upon CISA's announcement, the emergency patching process should be initiated. This involves deploying the vendor-supplied patches to all affected systems, starting with internet-facing servers (for the Fortinet flaw) and high-risk user groups. Patching vulnerabilities listed in the KEV catalog should be treated with the highest urgency, as it is a certainty that threat actors are actively scanning for and exploiting them.
To effectively act on CISA KEV alerts, organizations need a mature vulnerability scanning program. This isn't just about running a scan; it's about integrating the KEV feed into the program's logic. Your vulnerability management platform should be configured to automatically raise the priority of any finding that appears in the KEV catalog. Immediately following the addition of CVE-2026-21643 and CVE-2020-9715, an out-of-band, authenticated scan should be launched against the entire environment, specifically looking for these vulnerabilities. The results should be fed directly into a ticketing system for the teams responsible for patching, with a short, non-negotiable SLA for remediation. This ensures that CISA's intelligence is translated into concrete defensive action as quickly as possible.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats