Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

0
Low
Exploitremote
Published: Wed Feb 18 2026 (02/18/2026, 06:52:00 UTC)
Source: The Hacker News

Description

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2026-2441 (CVSS score: 8.8) - A use-after-free vulnerability in Google Chrome that could allow a remote attacker to potentially exploit heap

AI-Powered Analysis

AILast updated: 02/18/2026, 10:13:19 UTC

Technical Analysis

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently updated its Known Exploited Vulnerabilities (KEV) catalog to include four significant security flaws currently under active exploitation. The first, CVE-2026-2441, is a use-after-free vulnerability in Google Chrome with a CVSS score of 8.8. This flaw allows remote attackers to exploit heap corruption by delivering a crafted HTML page, potentially leading to remote code execution without user interaction. Google has acknowledged active exploitation but has withheld detailed weaponization information to allow patch deployment. The second vulnerability, CVE-2024-7694, affects TeamT5 ThreatSonar Anti-Ransomware versions 3.4.5 and earlier. It permits arbitrary file uploads, enabling attackers to execute arbitrary system commands on the server, though exploitation details remain unclear. Third, CVE-2020-7796 is a critical server-side request forgery (SSRF) vulnerability in Synacor Zimbra Collaboration Suite (ZCS) with a CVSS score of 9.8. This flaw allows attackers to send crafted HTTP requests to remote hosts, potentially accessing sensitive information. Threat intelligence reports have documented active exploitation clusters targeting multiple countries, including Germany and Lithuania. Lastly, CVE-2008-0015 is a stack-based buffer overflow in Microsoft Windows Video ActiveX Control (CVSS 8.8), enabling remote code execution via malicious web pages. Exploits have been observed to download malware such as the Dogkild worm, which propagates through removable drives and disables security processes. The vulnerabilities span multiple attack vectors, including remote code execution, SSRF, and arbitrary command execution, affecting widely used software components. Federal Civilian Executive Branch agencies are urged to apply patches by March 10, 2026, underscoring the urgency of mitigation efforts.

Potential Impact

European organizations face significant risks from these vulnerabilities due to the widespread use of the affected products. The Google Chrome flaw threatens confidentiality and integrity by enabling remote code execution through crafted web content, potentially compromising user systems and sensitive data. The TeamT5 ThreatSonar Anti-Ransomware vulnerability could allow attackers to bypass ransomware defenses, execute arbitrary commands, and gain persistent access, undermining endpoint security. The Synacor Zimbra SSRF vulnerability poses a high risk to email and collaboration infrastructure, potentially exposing sensitive communications and internal network resources. The Microsoft Windows ActiveX flaw can lead to malware infections that disable security tools and propagate laterally, increasing the risk of widespread compromise. Given the active exploitation and the critical nature of these vulnerabilities, European enterprises, especially those in finance, government, healthcare, and critical infrastructure sectors, could experience data breaches, operational disruptions, and reputational damage. The SSRF attacks targeting Germany and Lithuania indicate a focused threat against European targets, amplifying the regional impact. Additionally, the potential for worm propagation via the ActiveX flaw could lead to rapid infection spread within enterprise networks.

Mitigation Recommendations

Organizations should prioritize immediate patching of all affected software versions, including updating Google Chrome to the latest secure release and applying vendor patches for TeamT5 ThreatSonar Anti-Ransomware, Synacor Zimbra Collaboration Suite, and Microsoft Windows components. For the Chrome vulnerability, deploying browser security features such as sandboxing, strict content security policies (CSP), and disabling unnecessary plugins can reduce exploitation risk. Network-level protections should include web filtering to block access to malicious sites hosting exploit code and monitoring for unusual HTTP requests indicative of SSRF attempts against Zimbra servers. Endpoint detection and response (EDR) solutions should be tuned to detect behaviors associated with the Dogkild worm and arbitrary command execution. Implementing strict file upload validation and access controls on servers running ThreatSonar can mitigate arbitrary file upload risks. Regularly auditing and restricting ActiveX control usage, especially in legacy systems, will reduce attack surface. Organizations should also conduct threat hunting for indicators of compromise related to these vulnerabilities and enhance user awareness to avoid social engineering vectors. Finally, maintaining robust backup and incident response plans will help mitigate damage from potential ransomware or malware infections stemming from these exploits.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/cisa-flags-four-security-flaws-under.html","fetched":true,"fetchedAt":"2026-02-18T10:12:39.310Z","wordCount":988}

Threat ID: 6995909980d747be205dea25

Added to database: 2/18/2026, 10:12:41 AM

Last enriched: 2/18/2026, 10:13:19 AM

Last updated: 2/19/2026, 9:46:36 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats