March 20, 2026

Exploitation Campaigns and KEV additions Marked an Intensifying Threat Landscape This Week

Executive Summary

The past week saw a surge in actively exploited critical vulnerabilities targeting widely used enterprise and consumer technologies, signaling an urgent escalation in threat activity.  CISA added five vulnerabilities to its KEV catalog, including two affecting Google products and one each impacting Microsoft SharePoint, Synacor Zimbra Collaboration Suite, and Wing FTP Server.  

At the same time, Amazon Web Services Threat Intelligence reported an ongoing Interlock ransomware campaign exploiting a critical flaw in Cisco Secure Firewall Management Center, emphasizing the immediate risk to network infrastructure. Additionally, Google disclosed that the DarkSword exploit chain was actively used by multiple threat actors to compromise iOS devices across several regions through coordinated, multi-vulnerability attacks.

Key points:

  • 5 vulnerabilities added to the CISA KEV catalog  
  • Interlock Ransomware exploited Cisco FMC Zero-Day for remote code execution  
  • Google Discloses Sophisticated iOS Exploit Chain "DarkSword" Targeting Global Users

What are the top trending or critical vulnerabilities observed this week?

Several high-impact vulnerabilities are currently trending across the cybersecurity community, demanding immediate attention and patch prioritization. Monitoring these emerging and widely discussed threats provides valuable insights, enabling organizations to make informed security decisions and strengthen their overall defense posture.

CVE-2026-3909 - Out-of-Bounds Write vulnerability in Google Skia

An Out-of-Bounds Write vulnerability in Google Skia was identified that could be exploited via a crafted HTML page to corrupt memory and potentially achieve arbitrary code execution. The issue affected Google Chrome, ChromeOS, Android, Flutter and related products prior to version 146.0.7680.7, highlighting its broad impact across platforms. Successful exploitation could lead to browser crashes or full system compromise depending on execution context. Google remediated the issue with updates 146.0.7680.75/76 for Windows and Mac and 146.0.7680.75 for Linux. The flaw was subsequently added to the CISA KEV catalog, indicating active exploitation risk.

CVE-2026-3910 - Improper Restrictions of Operations Within the Bounds of a Memory Buffer vulnerability in Google Chromium V8

An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability was identified in the V8 engine of Google Chrome, enabling a remote attacker to execute arbitrary code within the browser sandbox via a crafted HTML page. The flaw impacted Chromium-based browsers, including Chrome, Microsoft Edge, and Opera, prior to version 146.0.7680.75. As a core component of JavaScript execution, Chromium V8 remains a frequent target for attackers attempting sandbox escape and deeper system compromise. Google addressed the issue by releasing version 146.0.7680.75/76 for Windows and Mac and 146.0.7680.75 for Linux. The vulnerability was reported to be actively exploited in the wild and was subsequently added to the CISA KEV catalog.

CVE-2026-20963 - Deserialization of Untrusted Data vulnerability in Microsoft SharePoint

A Deserialization of Untrusted Data vulnerability in Microsoft SharePoint enabled an unauthenticated attacker to execute arbitrary code remotely over a network. The flaw affected SharePoint Server 2016, 2019, and Subscription Edition, and was reported to Microsoft by an anonymous researcher. According to Microsoft, the vulnerability could allow attackers to inject and execute malicious code without prior authentication, posing a significant risk to enterprise environments. The issue was addressed in security updates released in January 2026. It was subsequently added to the CISA KEV catalog, emphasizing its potential for active exploitation.  

CVE-2025-47813 - Information Disclosure vulnerability in Wing FTP Server

An Information Disclosure vulnerability in Wing FTP Server was identified in versions prior to 7.4.4, where improper error message handling exposed sensitive information when a long UID cookie value was supplied. The flaw caused the application to leak its internal installation path through the /loginok.html endpoint due to insufficient input validation and path length handling. Although the issue was resolved in version 7.4.4 in May 2025, its inclusion in the CISA KEV catalog highlighted its security significance. No active exploitation had been observed at the time, and potential chaining with other vulnerabilities remained unclear.

CVE-2025-66376 - Cross-Site Scripting vulnerability in Synacor Zimbra Collaboration Suite (ZCS)

A Cross-Site Scripting (XSS) vulnerability in Synacor Zimbra Collaboration Suite Classic UI allowed attackers to abuse CSS @import directives in crafted emails, leading to execution of malicious JavaScript when opened. The flaw was exploited in “Operation GhostMail,” as reported by Seqrite Labs, targeting Ukraine’s State Hydrographic Service through phishing emails sent from compromised accounts. The malicious scripts enabled extensive data exfiltration, including credentials, session tokens, 2FA backup codes, and mailbox contents via DNS and HTTPS channels. The activity has been attributed to APT28, indicating a sophisticated espionage-driven campaign. The issue was remediated in versions 10.0.18 and 10.1.13 released in November 2025. The vulnerability was subsequently added to the CISA KEV catalog.

What did Cytellite sensors detect this week?

Cytellite telemetry captured active exploit attempts and mass scanning campaigns against exposed services globally. The data highlights which vulnerabilities are under attack and provides source IPs and payloads to authorized teams for detailed threat analysis and validation.

Vulnerabilities Product Severity Title Exploited in the-wild CISA KEV
CVE-2025-5777 Citrix NetScaler ADC and Gateway Critical Out-of-Bounds Read vulnerability in Citrix NetScaler ADC and Gateway Yes True
CVE-2025-31324 SAP NetWeaver Visual Composer Metadata Uploader Critical Unrestricted Upload of File with Dangerous Type vulnerability in SAP NetWeaver Visual Composer Metadata Uploader Yes True
CVE-2025-22457 Ivanti Connect Secure, Ivanti Policy Secure and Ivanti ZTA Gateways High Stack-based Buffer Overflow vulnerability in Ivanti Connect Secure, Ivanti Policy Secure and Ivanti ZTA Gateways Yes True
CVE-2025-10093 D-Link DIR-852 High Information Disclosure Vulnerability in D-Link DIR-852 router No False
CVE-2024-47176 CUPS Medium Improper Input Validation vulnerability in OpenPrinting CUPS browsed through 2.0.1 leads to remote code execution Yes False
CVE-2024-4577 PHP CGI Critical OS Command Injection vulnerability in PHP CGI leads to remote code execution Yes True
CVE-2024-3721 TBK DVR devices Medium OS Command Injection vulnerability in TBK DVR-4104 and DVR-4216 Yes False
CVE-2024-3400 Palo Alto Networks PAN-OS Critical Command Injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS Yes True
CVE-2024-27348 Apache HugeGraph-Server Critical Improper Access Control vulnerability in Apache HugeGraph-Server Yes True
CVE-2023-4966 NetScaler ADC and NetScaler Gateway Critical Buffer Overflow vulnerability in NetScaler ADC and NetScaler Gateway leads to sensitive information disclosure Yes True

Which vulnerabilities were abused by malware this week?

Active malware campaigns exploited specific vulnerabilities to deliver payloads and carry out post-exploitation actions. Each targeted vulnerability is proactively monitored, manually analysed, and mapped to MITRE ATT&CK tactics and techniques. Insights are derived from the LOVI vulnerability intelligence platform, which aggregates and curates data from multiple sources, OSINT groups, blogs, and data leak sites.

Interlock Ransomware exploited Cisco FMC Zero-Day for remote code execution

According to Amazon Web Services Threat Intelligence, an active Interlock ransomware campaign was observed exploiting a critical vulnerability in Cisco Secure Firewall Management Center, a vulnerability stemming from insecure deserialization of user-supplied Java byte streams. The vulnerability allowed unauthenticated remote attackers to bypass authentication and execute arbitrary Java code with root privileges on affected devices. Analysis from AWS’s MadPot global sensor network indicated that exploitation began as a zero-day in late January 2026, prior to public disclosure by Cisco. The investigation further revealed that the threat actor inadvertently exposed parts of their operational infrastructure, providing visibility into a multi-stage attack chain, custom remote access tools, reconnaissance scripts, and evasion techniques.  

Google Discloses Sophisticated iOS Exploit Chain "DarkSword" Targeting Global Users

According to Google, the DarkSword exploit chain was utilized by threat actors UNC6748, PARS Defense, and UNC6353 to compromise iOS devices through various campaigns across Saudi Arabia, Turkey, Malaysia, and Ukraine. This sophisticated operation leveraged six distinct vulnerabilities CVE-2025-31277, CVE-2026-20700, CVE-2025-43529, CVE-2025-14174, CVE-2025-43510, and CVE-2025-43520 to achieve full-chain exploitation. These actors deployed malicious payloads like GHOSTKNIFE, GHOSTSABER, and GHOSTBLADE via Snapchat-themed decoys and "Watering Hole" attacks to exfiltrate sensitive data from targets. The vulnerabilities spanned remote code execution, sandbox escapes, and privilege escalation, all of which were successfully patched following the investigation.

Vulnerability Severity Title Patch Abused By Malware OBS
CVE-2026-20131 Critical Deserialization of Untrusted Data vulnerability in Cisco Secure Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Yes ◦ Interlock ransomware False
CVE-2026-20700 High Buffer Overflow vulnerability in Apple Multiple Products Yes ◦ GHOSTBLADE
◦ GHOSTENGINE
◦ GHOSTRAT
◦ UNC6353
◦ UNC6748
◦ PARS Defense
◦ Watering Hole campaign
False
CVE-2025-14174 High Out of Bounds Memory Access vulnerability in Google Chromium Yes ◦ GHOSTBLADE
◦ GHOSTENGINE
◦ GHOSTRAT
◦ UNC6353
◦ UNC6748
◦ PARS Defense
◦ Watering Hole campaign
False
CVE-2025-31277 High Improper Restriction of Operations within the Bounds of a Memory Buffer in Apple Multiple Products Yes ◦ GHOSTBLADE
◦ GHOSTENGINE
◦ GHOSTRAT
◦ UNC6353
◦ UNC6748
◦ PARS Defense
◦ Watering Hole campaign
False
CVE-2025-43510 High Memory Corruption vulnerability in Apple Multiple Products Yes ◦ GHOSTBLADE
◦ GHOSTENGINE
◦ UNC6353
◦ UNC6748
◦ PARS Defense
◦ Watering Hole campaign
False
CVE-2025-43520 High Memory Corruption vulnerability in Apple Multiple Products Yes ◦ GHOSTBLADE
◦ GHOSTENGINE
◦ UNC6353
◦ UNC6748
◦ PARS Defense
◦ Watering Hole campaign
False
CVE-2025-43529 High Memory Corruption vulnerability in Apple Multiple Products Yes ◦ GHOSTBLADE
◦ GHOSTENGINE
◦ GHOSTRAT
◦ UNC6353
◦ UNC6748
◦ PARS Defense
◦ Watering Hole campaign
False

What were the most trending OSS vulnerabilities this week?

Open-Source Software (OSS) vulnerabilities are security weaknesses discovered in publicly available codebases that can be exploited across widely used libraries, frameworks, and tools, often impacting thousands of downstream applications.

CVE-ID Title Ecosystem
CVE-2026-4324 SQL Injection vulnerability in Katello plugin for Red Hat Satellite RubyGems
CVE-2026-21852 Insufficiently Protected Credentials vulnerability in Claude Code npm
CVE-2026-30856 Tool Execution Hijacking vulnerability in WeKnora LLM-powered Framework Go
CVE-2026-32633 Insufficiently Protected Credentials vulnerability in Glances cross-platform monitoring tool PyPI
CVE-2017-1000487 Command Injection vulnerability in Plexus-utils Debian, Maven

Were any PRE-NVD vulnerabilities identified this week?

PRE-NVD vulnerabilities refer to security flaws that are discovered, discussed, or even exploited in the wild before their official inclusion in the National Vulnerability Database (NVD). These early-stage vulnerabilities often emerge through threat actor chatter, exploit proof-of-concepts, and technical disclosures shared across social media platforms and underground forums, signaling potential exploitation risks before public awareness.

CVE-ID Type of vulnerability Product Reference
CVE-2026-3864 Path Traversal Kubernetes CSI Driver for NFS Resource
CVE-2026-33013 Denial of Service Micronaut Resource
CVE-2026-33040 Remote unauthenticated denial of service libp2p Gossipsub Resource
CVE-2026-33053 Insecure Direct Object Reference (IDOR) Langflow Resource
CVE-2026-33140 Cross-Site Scripting (XSS) PySpector Resource

Conclusion

Overall, the week emphasized the rapid weaponization of newly disclosed vulnerabilities, reflecting an increasingly aggressive threat landscape. The convergence of active KEV additions, ransomware-driven exploitation, and multi-stage attack chains highlighted the growing speed and sophistication of modern campaigns. These developments reinforced the need for immediate patching, continuous monitoring, and proactive defense strategies. Platforms such as Loginsoft Vulnerability Intelligence (LOVI) enable organizations to stay ahead by providing timely, actionable insights into exploited vulnerabilities, emerging threats, and evolving risk exposure.

FAQs:

1) What is Google Skia?

A) Google Skia is an open-source 2D graphics rendering engine used to draw text, shapes, and images across platforms. It powers visual rendering in applications like Google Chrome, Android, and Flutter. Skia provides high-performance graphics by handling low-level drawing operations efficiently, making it a core component in modern UI and browser rendering systems.

2) Does inclusion in the CISA KEV catalog mean exploitation is widespread?

A) Not necessarily widespread - but confirmed. KEV inclusion indicates verified in-the-wild exploitation. While the scale may vary, the operational reality is that threat actors possess working exploits, making patch prioritization urgent regardless of observed targeting volume.

3) How does LOVI help organizations manage vulnerabilities effectively?

A) Loginsoft Vulnerability Intelligence empowers you to efficiently prioritize and respond to potential vulnerabilities by focusing on those actively exploited in the wild. LOVI correlates vulnerability data with real-world threat activity to reduce noise and improve decision-making. This approach enables faster remediation and stronger security posture.

4) What is Cytellite?

A) Cytellite is a Loginsoft security intelligence platform that provides real-time visibility into emerging threats through a global sensor network. It delivers actionable IP intelligence to help organizations detect, analyze, and respond to attacks quickly. By correlating threat data with live activity, Cytellite strengthens resilience across dynamic threat landscapes.

Subscribe to our Newsletter