Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline
    Cybersecurity

    CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

    adminBy adminApril 25, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananApr 25, 2026Network Security / Infrastructure Security

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

    The list of vulnerabilities is below –

    • CVE-2024-57726 (CVSS score: 9.9) – A missing authorization vulnerability in SimpleHelp that could allow low-privileged technicians to create API keys with excessive permissions, which can then be used to escalate privileges to the server admin role.
    • CVE-2024-57728 (CVSS score: 7.2) – A path traversal vulnerability in SimpleHelp that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e., zip slip), which can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.
    • CVE-2024-7399 (CVSS score: 8.8) – A path traversal vulnerability in Samsung MagicINFO 9 Server that could allow an attacker to write arbitrary files as system authority.
    • CVE-2025-29635 (CVSS score: 7.5) – A command injection vulnerability in end-of-life D-Link DIR-823X series routers that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function.

    While both the SimpleHelp flaws have been marked as “Unknown” against the “Known To Be Used in Ransomware Campaigns?” Indicators, reports from Field Effect and Sophos revealed early last year that the issues were exploited as a precursor to ransomware attacks. One such campaign was attributed to the DragonForce ransomware operation.

    The exploitation of CVE-2024-7399 has been linked to malicious activity deploying the Mirai botnet in the past. As for CVE-2025-29635, Akamai disclosed earlier this week that it recorded attempts against D-Link devices to deliver a Mirai botnet variant named “tuxnokill.”

    To mitigate the active threats, Federal Civilian Executive Branch (FCEB) agencies are recommended to apply the fixes or, in the case of CVE-2025-29635, discontinue the use of the appliance by May 8, 2026.

    adds CISA deadline Exploited federal Flaws KEV sets
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow disruptors are winning AI search visibility
    Next Article I turned a Raspberry Pi and mini PC into a portable homelab that fits in my backpack
    admin
    • Website

    Related Posts

    New Cisco firewall malware can only be killed by pulling the plug

    April 25, 2026

    New BlackFile extortion group linked to surge of vishing attacks

    April 25, 2026

    China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

    April 25, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google Pushes “Bounce Click” Explanation For AI Overview Traffic Loss

    April 25, 2026

    I turned a Raspberry Pi and mini PC into a portable homelab that fits in my backpack

    April 25, 2026

    CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

    April 25, 2026

    How disruptors are winning AI search visibility

    April 25, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,509)
    • Privacy & Online Earning (183)
    • SEO & Digital Marketing (927)
    • Tech Tools & Mobile / Apps (1,793)
    • WiFi / Internet & Networking (246)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google Pushes “Bounce Click” Explanation For AI Overview Traffic Loss

    April 25, 2026

    I turned a Raspberry Pi and mini PC into a portable homelab that fits in my backpack

    April 25, 2026

    CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

    April 25, 2026
    Most Popular
    • Google Pushes “Bounce Click” Explanation For AI Overview Traffic Loss
    • I turned a Raspberry Pi and mini PC into a portable homelab that fits in my backpack
    • CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline
    • How disruptors are winning AI search visibility
    • New Cisco firewall malware can only be killed by pulling the plug
    • These are the 10 best Shizuku apps for leveling up Android
    • New BlackFile extortion group linked to surge of vishing attacks
    • The Facts About Google Click Signals, Rankings, And SEO
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.