The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog, adding two new, currently undisclosed vulnerabilities. The action, taken on January 7, 2026, signifies that CISA possesses credible evidence that these flaws are being actively exploited in the wild. Under Binding Operational Directive (BOD) 22-01, U.S. Federal Civilian Executive Branch (FCEB) agencies are mandated to remediate these vulnerabilities by a set due date. While the directive is specific to federal agencies, CISA strongly advises all organizations to use the KEV catalog as a primary input for their vulnerability management prioritization, as these flaws represent clear and present dangers.
As of the time of this report, the specific CVE identifiers and technical details of the two newly added vulnerabilities have not been publicly detailed in the initial alert. Their addition to the KEV catalog is based on intelligence confirming active exploitation by threat actors. The KEV catalog entry for each vulnerability will typically include the vendor, product, vulnerability name, a brief description, and the remediation due date for federal agencies.
The affected products and vendors are not specified in the summary alert but will be listed in the official KEV catalog entry. Organizations should consult the catalog directly for this information.
CRITICAL: Both vulnerabilities are confirmed to be under active exploitation. This means that threat actors have developed working exploits and are using them in real-world attacks. Any organization with vulnerable systems is at immediate risk of compromise.
The impact of exploitation depends on the nature of the vulnerabilities. However, flaws added to the KEV catalog are typically those that allow for significant unauthorized access, such as remote code execution or privilege escalation. A successful exploit could lead to initial access for ransomware deployment, data theft, or espionage. The mandate for federal agencies to patch underscores the high-risk nature of these vulnerabilities.
M1051 - Update Software.Applying vendor-supplied security updates is the primary method for remediating known vulnerabilities.
Mapped D3FEND Techniques:
The inclusion of any vulnerability in the CISA KEV catalog is a directive for immediate action. The core defensive measure is a rapid and comprehensive patching process. Organizations must leverage their asset inventory and vulnerability management systems to immediately identify all instances of the affected products listed in the KEV update. A patch deployment plan should be executed with the highest priority, focusing first on internet-facing systems, then critical internal servers, and finally all other affected endpoints. The remediation timeline should aim to meet or beat the deadline set by CISA for federal agencies. This is not a routine patch cycle; it is an emergency response to a confirmed, active threat. Failure to patch in a timely manner constitutes acceptance of a very high risk of compromise.
A KEV alert tests an organization's vulnerability management program. A mature program should have automated feeds from the KEV catalog integrated into its scanning and ticketing systems. When CISA issued this alert, it should have automatically triggered scans and created high-priority tickets assigned to the relevant system owners. The security operations team should use this event to validate their process: How quickly were we able to identify our exposure? Was our asset inventory accurate? Did the automated workflow function correctly? This process of continuous validation and improvement ensures that the organization can respond effectively and efficiently to the next KEV alert, minimizing the window of exposure to actively exploited threats.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats