Download Now
February 27, 2026

CISA KEV Expands as Malware Campaigns Target Enterprise Infrastructure

Executive Summary

This week’s threat landscape was marked by confirmed exploitation of critical enterprise technologies, prompting urgent action from federal authorities. Five vulnerabilities were added to the CISA Known Exploited Vulnerabilities (KEV) catalog, affecting widely deployed products from Cisco, Roundcube Webmail, and Soliton Systems K.K.’s FileZen platform - underscoring the continued focus of threat actors on identity systems, network infrastructure, and file transfer solutions.  

Advanced threat activity this week highlighted the continued targeting of enterprise infrastructure and communication platforms by sophisticated threat actors. Cisco Talos reported active exploitation of an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller (formerly vSmart), which allowed unauthenticated remote attackers to send crafted requests and gain administrative access as an internal, high-privileged, non-root user - creating significant exposure across enterprise network environments. At the same time, TeamT5 confirmed that a critical PHP object deserialization vulnerability in Roundcube Webmail has been actively exploited since April 2025 by the China-linked APT group CamoFei, enabling remote code execution following account compromise and impacting organizations across the APAC region.

Key points:

  • 5 vulnerabilities added to the CISA KEV catalog  
  • China-Linked APT exploited Roundcube Webmail at scale
  • Cisco SD-WAN zero-day exploitation attributed to UAT-8616

What are the top trending or critical vulnerabilities observed this week?

Several high-impact vulnerabilities are currently trending across the cybersecurity community, demanding immediate attention and patch prioritization. Monitoring these emerging and widely discussed threats provides valuable insights, enabling organizations to make informed security decisions and strengthen their overall defense posture.

CVE-2026-20127 - Authentication Bypass vulnerability in Cisco Catalyst SD-WAN Controller and Manager

An Authentication Bypass vulnerability in Cisco Catalyst SD-WAN Controller and Manager could allow an unauthenticated remote attacker to bypass authentication and obtain administrative access to an affected system. The issue arises from a flawed peering authentication mechanism within Cisco Catalyst SD-WAN Controller (formerly vSmart) and Manager (formerly vManage), where crafted requests can circumvent intended access controls. Successful exploitation enables login as an internal, high-privileged, non-root administrative user, granting access to NETCONF and the ability to manipulate SD-WAN fabric configurations. The vulnerability was reportedly exploited as a zero-day, highlighting the risk of unauthorized control over enterprise network infrastructure. Cisco has addressed this issue in its official security advisory, and due to confirmed in-the-wild exploitation, the vulnerability has been added to the CISA KEV catalog, underscoring the urgency of immediate patching and access control hardening.

CVE-2026-25108 - OS Command Injection vulnerability in Soliton Systems K.K FileZen

An OS Command Injection vulnerability affecting the FileZen file transfer appliance, allowing authenticated users to execute arbitrary operating system commands on the underlying server. The flaw arises when the optional Antivirus Check feature is enabled, where improper input handling during interaction with antivirus components introduces the injection vector. Exploitation requires a logged-in user to send a specially crafted HTTP request, creating risk of privilege escalation and potential full system compromise. Soliton Systems K.K. has addressed the issue in FileZen version 5.0.11, and due to confirmed in-the-wild exploitation, the vulnerability has been added to the CISA KEV catalog.

CVE-2025-49113 - Deserialization of Untrusted Data vulnerability in RoundCube Webmail

A Deserialization of Untrusted Data vulnerability has been identified in Roundcube Webmail, enabling authenticated users to achieve remote code execution due to improper validation of the_from URL parameter in program/actions/settings/upload.php. The flaw stems from unsanitized $_GET['_from'] input, which can trigger PHP object deserialization when session variable names begin with an exclamation mark (!), leading to session corruption and PHP object injection. Affected versions include releases prior to 1.5.10 and 1.6.x prior to 1.6.11, with fixes issued in June 2025 under version 1.5.10 LTS and 1.6.11. Following disclosure by security researcher Kirill Firsov, attackers reportedly reverse-engineered the patch within 48 hours and began circulating working exploits, increasing the risk of widespread compromise particularly for internet-exposed instances running on ports 2083, 2086, 2087, and 2096. With proof-of-concept code and underground exploit listings observed, the vulnerability has now been added to the CISA KEV catalog, underscoring the urgency of immediate remediation.

CVE-2025-68461 - Cross-Site Scripting vulnerability in RoundCube Webmail

A Cross-Site Scripting vulnerability has been identified in Roundcube Webmail, arising from improper handling of the <animate> tag within Scalable Vector Graphics (SVG) files. The flaw affects versions prior to 1.5.12 and 1.6.x prior to 1.6.12, and was remediated in December 2025 with the release of versions 1.5.12 and 1.6.12. Discovered by CrowdStrike, the issue allows attackers to embed a specially crafted SVG file within a malicious email, triggering arbitrary JavaScript execution as soon as the image is rendered in the webmail interface. Such exploitation could lead to session hijacking, credential theft, unauthorized actions, or silent redirection to phishing pages without further user interaction. Due to confirmed exploitation risk, the vulnerability has recently been added to the CISA KEV catalog, emphasizing the need for immediate patching.

CVE-2022-20775 - Path Traversal vulnerability in Cisco SD-WAN

A Path Traversal vulnerability in Cisco SD-WAN could allow an authenticated local attacker to gain elevated privileges due to improper access controls within the application CLI, ultimately enabling arbitrary command execution as the root user. According to Cisco Talos, exploitation activity targeting Cisco Catalyst SD-WAN infrastructure has demonstrated sophisticated vulnerability chaining techniques. In observed campaigns, threat actors first leveraged CVE-2026-20127, an authentication bypass vulnerability, to obtain administrative access to exposed controllers. The attackers then performed a software downgrade to reintroduce the previously patched CVE-2022-20775, exploiting it to escalate privileges to root before restoring the original software version to evade detection while retaining the full control. This multi-stage approach highlights a deliberate strategy to achieve deep persistence and unrestricted manipulation of SD-WAN network configurations. Due to the severity and confirmed exploitation patterns, this vulnerability has been added to the CISA KEV catalog, emphasizing the urgency of remediation and strict access control enforcement.

What did Cytellite sensors detect this week?

Cytellite telemetry captured active exploit attempts and mass scanning campaigns against exposed services globally. The data highlights which vulnerabilities are under attack and provides source IPs and payloads to authorized teams for detailed threat analysis and validation.

Vulnerabilities Product Severity Title Exploited in the-wild CISA KEV
CVE-2025-7417 Tenda O3V2 High Improper Restriction of Operations within the Bounds of a Memory Buffer in Tenda O3V2 No False
CVE-2025-7414 Tenda O3V2 High OS Command Injection vulnerability in Tenda O3V2 No False
CVE-2025-4632 Samsung MagicINFO 9 Critical Path Traversal Vulnerability in Samsung MagicINFO 9 Yes True
CVE-2025-3248 Langflow Critical Missing Authentication for Critical Function vulnerability in Langflow Yes True
CVE-2025-31324 SAP NetWeaver Critical An Unrestricted vulnerability in the SAP NetWeaver Yes True
CVE-2025-26399 SolarWinds Web Help Desk Critical Deserialization vulnerability in SolarWinds Web Help Desk No False
CVE-2025-10093 D-Link DIR-852 Medium Information Disclosure Vulnerability in D-Link DIR-852 No False
CVE-2024-47176 CUPS Medium Improper Input Validation vulnerability in OpenPrinting CUPS browsed through 2.0.1 leads to remote code execution Yes False
CVE-2024-4577 PHP CGI Critical OS Command Injection vulnerability in PHP CGI leads to remote code execution. Yes True
CVE-2024-3400 Palo Alto Networks PAN-OS Critical Command Injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS Yes True

Which vulnerabilities were abused by malware this week?

Active malware campaigns exploited specific vulnerabilities to deliver payloads and carry out post-exploitation actions. Each targeted vulnerability is proactively monitored, manually analysed, and mapped to MITRE ATT&CK tactics and techniques. Insights are derived from the LOVI vulnerability intelligence platform, which aggregates and curates data from multiple sources, OSINT groups, blogs, and data leak sites.

Cisco SD-WAN zero-day exploitation attributed to UAT-8616

According to Cisco Talos, CVE-2026-20127, an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller (formerly vSmart), was actively exploited, allowing unauthenticated remote attackers to send crafted requests and gain administrative access as an internal, high-privileged, non-root user. Talos tracked the exploitation and subsequent post-compromise activity under the cluster name “UAT-8616,” assessing the actor with high confidence as a sophisticated threat group. Investigation revealed that exploitation activity dated back to at least 2023, with the actor reportedly performing a software version downgrade to reintroduce CVE-2022-20775, exploiting it for root privilege escalation before restoring the original software version to maintain covert access. The campaign reflected an ongoing pattern of targeting network edge devices to establish long-term persistence within high-value organizations, including critical infrastructure sectors.

China-Linked APT exploited Roundcube Webmail at scale

According to TeamT5, CVE-2025-49113, a critical post-authentication PHP object deserialization vulnerability in Roundcube Webmail has been actively exploited since April 2025 by the China-linked APT group CamoFei. Successful exploitation enables remote code execution through compromised Roundcube accounts, followed by deployment of malicious tools including the open-source webshell Godzilla and the remote access trojan Pupy, with observed targeting of educational institutions in Taiwan and government agencies in Pakistan and Myanmar.

CVE Severity Title Patch Abused By Malware OSS
CVE-2026-20127 Critical Authentication Bypass vulnerability in Cisco Catalyst SD-WAN Controller and Manager Yes UAT-8616 False
CVE-2025-49113 Critical Deserialization of Untrusted Data vulnerability in RoundCube Webmail Yes Godzilla Webshell
PupyRAT
CamoFei
True
CVE-2022-20775 High Path Traversal vulnerability in Cisco SD-WAN Yes UAT-8616 False

What were the most trending OSS vulnerabilities this week?

Open-Source Software (OSS) vulnerabilities are security weaknesses discovered in publicly available codebases that can be exploited across widely used libraries, frameworks, and tools, often impacting thousands of downstream applications.

CVE-ID Title Ecosystem
CVE-2026-2970 Unsafe Deserialization in datapizza-ai PyPI
CVE-2026-25747 Deserialization of Untrusted Data vulnerability in Apache Camel Maven
CVE-2026-27626 OS Command Injection vulnerability in OliveTin Go
CVE-2026-27799 Heap buffer over-read vulnerability in DJVU image format handler of ImageMagick NuGet
CVE-2025-68613 Remote Code Execution in n8n npm

Were any PRE-NVD vulnerabilities identified this week?

PRE-NVD vulnerabilities refer to security flaws that are discovered, discussed, or even exploited in the wild before their official inclusion in the National Vulnerability Database (NVD). These early-stage vulnerabilities often emerge through threat actor chatter, exploit proof-of-concepts, and technical disclosures shared across social media platforms and underground forums, signaling potential exploitation risks before public awareness.

CVE-ID Type of vulnerability Product Reference
CVE-2026-2749 Path Traversal Open Tickets Resource
CVE-2026-3029 Path Traversal PyMuPDF Resource
CVE-2026-3038 Stack-Based Buffer Overflow FreeBSD Resource
CVE-2026-2493 Sensitive Information Disclosure IceWarp Resource
CVE-2026-21424 Execution with Unnecessary Privileges Dell PowerScale OneFS Resource

Conclusion

This week’s threat activity underscored the accelerating pace at which adversaries exploit critical enterprise technologies, with confirmed attacks targeting Cisco Catalyst SD-WAN, Roundcube Webmail, and Soliton FileZen - all now reflected in the CISA KEV catalog. The focus on authentication bypass, remote code execution, and edge infrastructure compromise highlights a strategic push toward identity and network control systems. In such a rapidly evolving landscape, organizations must move beyond reactive patching and adopt proactive vulnerability intelligence. Loginsoft Vulnerability Intelligence (LOVI) empowers security teams with real-time exploitation insights and risk-based prioritization, enabling faster mitigation before threats escalate into operational disruption.

FAQs

1) What is Cisco Catalyst SD-WAN and what does it do?

Cisco Catalyst SD-WAN is a software-defined wide area networking (SD-WAN) solution designed to securely connect enterprise branch offices, data centers, cloud environments, and remote users over distributed networks. It centralizes network management and control through controllers (formerly vSmart and vManage), enabling organizations to optimize traffic routing, enforce security policies, and improve application performance across multiple locations

2) Does inclusion in the CISA KEV catalog mean exploitation is widespread?

Not necessarily widespread - but confirmed. KEV inclusion indicates verified in-the-wild exploitation. While the scale may vary, the operational reality is that threat actors possess working exploits, making patch prioritization urgent regardless of observed targeting volume.

3) How does LOVI help organizations manage vulnerabilities effectively?

Loginsoft Vulnerability Intelligence empowers you to efficiently prioritize and respond to potential vulnerabilities by focusing on those actively exploited in the wild. LOVI correlates vulnerability data with real-world threat activity to reduce noise and improve decision-making. This approach enables faster remediation and stronger security posture.

4) What is Cytellite?

Cytellite is a Loginsoft security intelligence platform that provides real-time visibility into emerging threats through a global sensor network. It delivers actionable IP intelligence to help organizations detect, analyze, and respond to attacks quickly. By correlating threat data with live activity, Cytellite strengthens resilience across dynamic threat landscapes.

Subscribe to our Newsletter