CISA Flags Two Exploited Vulnerabilities: Act Now!
Basically, CISA found two security flaws that hackers are actively using to attack systems.
CISA has identified two new vulnerabilities that hackers are actively exploiting. Both Google Skia and Chromium users are at risk. Organizations must act quickly to patch these vulnerabilities and protect their systems.
The Flaw
On March 13, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) announced the addition of two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. These vulnerabilities are CVE-2026-3909, an Out-of-Bounds Write? vulnerability in Google Skia, and CVE-2026-3910, an unspecified vulnerability in Google Chromium's V8 engine?. Both vulnerabilities have been confirmed to be actively exploited, making them critical for organizations to address immediately.
Out-of-Bounds Write? vulnerabilities occur when a program writes data outside the boundaries of allocated memory. This can lead to unpredictable behavior, including the potential for attackers to execute arbitrary code. The unspecified vulnerability in Chromium's V8 engine? poses similar risks, as it can be exploited to compromise the integrity of web applications and services.
What's at Risk
These vulnerabilities are particularly concerning because they serve as frequent attack vectors for malicious cyber actors. The federal enterprise is at significant risk, as these vulnerabilities can be exploited to gain unauthorized access to sensitive information and systems. The Binding Operational Directive (BOD)? 22-01 emphasizes the need for Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities promptly to protect against active threats.
The implications extend beyond federal agencies; organizations across various sectors need to be aware of these vulnerabilities. By not addressing them, companies risk exposing themselves to cyberattacks that could lead to data breaches or system failures.
Patch Status
CISA's KEV Catalog is a living document that lists vulnerabilities deemed significant risks. The agency will continue to update this catalog as new vulnerabilities are identified. While BOD 22-01 specifically applies to FCEB agencies, CISA strongly encourages all organizations to prioritize the remediation? of vulnerabilities listed in the KEV Catalog.
Organizations should check their systems for the presence of these vulnerabilities and implement necessary patches or mitigations. Timely remediation? is essential to reduce the risk of exploitation.
Immediate Actions
Organizations should take immediate steps to address these vulnerabilities. Here are some recommended actions:
- Assess your systems for the presence of CVE?-2026-3909 and CVE?-2026-3910.
- Implement patches provided by Google or other vendors as soon as possible.
- Review your vulnerability management practices to ensure timely remediation? of all known vulnerabilities.
By acting quickly, organizations can protect themselves against potential cyberattacks that exploit these vulnerabilities. CISA will continue to monitor and update the KEV Catalog, so staying informed is crucial for maintaining cybersecurity resilience.
CISA Advisories