CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws

CISA adds critical vulnerabilities in Microsoft SharePoint, Office Excel, Apple, Laravel, and Craft CMS to exploited vulnerabilities list.
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
Table of Contents
    Add a header to begin generating the table of contents

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has announced the inclusion of several significant vulnerabilities found in commonly used software into its Known Exploited Vulnerabilities (KEV) catalog. The new entries cover flaws in Microsoft SharePoint Server and Microsoft Office Excel, along with technologies from Apple, Laravel Livewire, and Craft CMS. This update is part of CISA’s ongoing effort to strengthen the cybersecurity posture of critical infrastructure by flagging vulnerabilities that are being actively leveraged by threat actors in the wild.

    Microsoft Software Vulnerabilities Added to the KEV Catalog

    CISA has identified and confirmed flaws in both Microsoft SharePoint Server and Microsoft Office Excel, adding them to the KEV catalog after evidence of active exploitation was established. These vulnerabilities pose a serious risk to organizations that rely on these widely adopted business applications across enterprise environments. Left unpatched, they can serve as entry points for attackers targeting corporate networks and sensitive data.

    Microsoft SharePoint Server and Office Excel Exploits

    • Microsoft SharePoint Server : Vulnerabilities within SharePoint have been exploited to gain unauthorized access and control over server operations. Attackers can use these weaknesses as an entry point into enterprise networks, potentially moving laterally across systems once initial access is established.
    • Microsoft Office Excel : Flaws discovered within Excel are being used by attackers to execute arbitrary code, which can compromise system integrity and lead to data breaches, unauthorized data access, or further malware deployment across affected systems.

    Organizations running either of these Microsoft products are strongly urged to apply available patches without delay and to review CISA’s official KEV catalog for any additional mitigation guidance.

    Apple, Laravel Livewire, and Craft CMS Also Flagged

    Beyond Microsoft, CISA has directed attention toward vulnerabilities affecting products from Apple, Laravel Livewire, and Craft CMS. Each of these presents distinct risks to end users and organizations, and each requires prompt action to reduce exposure.

    Vulnerabilities Across Apple and Web Development Frameworks

    • Apple : Specific flaws within Apple’s software ecosystem have been confirmed as actively exploited vulnerabilities. Apple users and administrators are encouraged to apply the latest security patches as quickly as possible to reduce risk exposure.
    • Laravel Livewire : Vulnerabilities found in this popular PHP-based web development framework could allow malicious actors to carry out unauthorized actions on web applications that depend on it, potentially exposing backend systems and user data.
    • Craft CMS : Similar risks have been identified in Craft CMS, a widely used content management system. Exploitation of these flaws could allow attackers to interfere with web application functionality or gain unauthorized access to administrative controls.

    CISA’s decision to expand the KEV catalog with these entries serves as a direct call to action for system administrators, IT security teams, and developers. Organizations are expected to remediate known exploited vulnerabilities within defined timeframes, particularly those operating within federal civilian executive branch agencies. However, private sector organizations are equally encouraged to treat these listings as high-priority security alerts.

    Staying current with CISA’s KEV catalog remains one of the more practical steps that security teams can take to reduce attack surface and keep pace with the tactics used by active threat actors across the threat landscape.

    Related Posts