Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
    Cybersecurity

    CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

    adminBy adminMarch 10, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMar 10, 2026Vulnerability / Enterprise Security

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

    The vulnerability list is as follows –

    • CVE-2021-22054 (CVSS score: 7.5) – A server-side request forgery (SSRF) vulnerability in Omnissa Workspace One UEM (formerly VMware Workspace One UEM) that could allow a malicious actor with network access to UEM to send requests without authentication and to gain access to sensitive information.
    • CVE-2025-26399 (CVSS score: 9.8) – A deserialization of untrusted data vulnerability in the AjaxProxy component of SolarWinds Web Help Desk that could allow an attacker to run commands on the host machine.
    • CVE-2026-1603 (CVSS score: 8.6) – An authentication bypass using an alternate path or channel vulnerability in Ivanti Endpoint Manager that could allow a remote unauthenticated attacker to leak specific stored credential data.

    The addition of CVE-2025-26399 comes in the wake of reports from Microsoft and Huntress that threat actors are exploiting security flaws in SolarWinds Web Help Desk to obtain initial access. The activity is believed to be the work of the Warlock ransomware crew.

    CVE-2021-22054, on the other hand, was flagged by GreyNoise in March 2025 as being exploited in conjunction with several other SSRF vulnerabilities in other products as part of a coordinated campaign.

    There are currently no details on how CVE-2026-1603 is being weaponized in the wild. As of writing, Ivanti’s security bulletin has not been updated to reflect the exploitation status.

    To counter the risk posed by active threats, Federal Civilian Executive Branch (FCEB) agencies have been ordered to apply the fix for SolarWinds Web Help Desk by March 12, 2026, and the remaining two by March 23, 2026.

    “These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,” CISA said.

    Actively CISA Exploited flags Ivanti SolarWinds Vulnerabilities workspace
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThese hidden Galaxy S26 features will save your eyes while scrolling at night
    Next Article Monster Hunter Now 116.0 APK Download by Niantic, Inc.
    admin
    • Website

    Related Posts

    US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor

    April 25, 2026

    CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

    April 25, 2026

    New Cisco firewall malware can only be killed by pulling the plug

    April 25, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google’s Nest Hub has no clue what time it is, and it’s messing with our heads

    April 25, 2026

    US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor

    April 25, 2026

    Google Pushes “Bounce Click” Explanation For AI Overview Traffic Loss

    April 25, 2026

    I turned a Raspberry Pi and mini PC into a portable homelab that fits in my backpack

    April 25, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,510)
    • Privacy & Online Earning (183)
    • SEO & Digital Marketing (927)
    • Tech Tools & Mobile / Apps (1,794)
    • WiFi / Internet & Networking (246)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google’s Nest Hub has no clue what time it is, and it’s messing with our heads

    April 25, 2026

    US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor

    April 25, 2026

    Google Pushes “Bounce Click” Explanation For AI Overview Traffic Loss

    April 25, 2026
    Most Popular
    • Google’s Nest Hub has no clue what time it is, and it’s messing with our heads
    • US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor
    • Google Pushes “Bounce Click” Explanation For AI Overview Traffic Loss
    • I turned a Raspberry Pi and mini PC into a portable homelab that fits in my backpack
    • CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline
    • How disruptors are winning AI search visibility
    • New Cisco firewall malware can only be killed by pulling the plug
    • These are the 10 best Shizuku apps for leveling up Android
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.