Cisco, Kentico, Zimbra Vulnerabilities - Exploited Flaws Alert

CISA has flagged eight new vulnerabilities, including serious flaws in Cisco, Kentico, and Zimbra. These flaws are being actively exploited, putting organizations at risk. Immediate action is required to patch these vulnerabilities and protect sensitive data.

VulnerabilitiesHIGHUpdated: Published:
Featured image for Cisco, Kentico, Zimbra Vulnerabilities - Exploited Flaws Alert

Original Reporting

SWSecurityWeek·Ionut Arghire

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, CISA found serious security flaws in popular software that hackers are already using.

The Flaw

Recently, the US Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited Vulnerabilities (KEV) catalog by adding eight new flaws. Among these are significant vulnerabilities in Cisco, Kentico, and Zimbra products that have already been exploited in the wild. These flaws could allow attackers to gain unauthorized access or execute malicious code.

What's at Risk

The newly flagged vulnerabilities include:

⚠️

CVE-2026-20133

A high-severity information disclosure bug in **Cisco Catalyst SD-WAN Manager**. This flaw allows attackers to access the API and read sensitive information from the operating system.

🔓

CVE-2025-2749

A path traversal vulnerability in **Kentico Xperience** that can lead to remote code execution (RCE). Attackers can upload arbitrary files to the server, potentially compromising the system.

📤

CVE-2025-48700

An XSS vulnerability in **Zimbra Collaboration Suite** that allows attackers to execute JavaScript within a user's session by exploiting insufficient HTML sanitization.

Patch Status

CISA has urged federal agencies to patch these vulnerabilities promptly. The deadline for patching the Cisco and Zimbra flaws is April 23, while other vulnerabilities must be addressed by May 4. This highlights the urgency for organizations to remain vigilant and proactive in their cybersecurity measures.

Immediate Actions

Organizations using affected products should:

Containment

  • 1.Update Software: Ensure that all systems are updated with the latest patches from vendors.
  • 2.Monitor Systems: Keep an eye on logs for any suspicious activity that may indicate exploitation attempts.

Conclusion

The exploitation of these vulnerabilities emphasizes the critical need for timely updates and robust security practices. Organizations must prioritize patching to mitigate risks associated with these flaws. Failure to act could result in significant data breaches and operational disruptions.

🔒 Pro Insight

🔒 Pro insight: The rapid exploitation of these vulnerabilities underscores the necessity for organizations to implement continuous monitoring and timely patch management strategies.

Related Pings