CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 26, 2026

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

The Hacker News Archived Apr 26, 2026 ✓ Full text saved

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is below - CVE-2024-57726 (CVSS score: 9.9) - A missing authorization vulnerability in

Full text archived locally
✦ AI Summary · Claude Sonnet


    CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline Ravie LakshmananApr 25, 2026Network Security / Infrastructure Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is below - CVE-2024-57726 (CVSS score: 9.9) - A missing authorization vulnerability in SimpleHelp that could allow low-privileged technicians to create API keys with excessive permissions, which can then be used to escalate privileges to the server admin role. CVE-2024-57728 (CVSS score: 7.2) - A path traversal vulnerability in SimpleHelp that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e., zip slip), which can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. CVE-2024-7399 (CVSS score: 8.8) - A path traversal vulnerability in Samsung MagicINFO 9 Server that could allow an attacker to write arbitrary files as system authority. CVE-2025-29635 (CVSS score: 7.5) - A command injection vulnerability in end-of-life D-Link DIR-823X series routers that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. While both the SimpleHelp flaws have been marked as "Unknown" against the "Known To Be Used in Ransomware Campaigns?" indicator in the KEV catalog, reports from Field Effect and Sophos revealed early last year that the issues were exploited as a precursor to ransomware attacks. One such campaign was attributed to the DragonForce ransomware operation. The exploitation of CVE-2024-7399 has been linked to malicious activity deploying the Mirai botnet in the past. As for CVE-2025-29635, Akamai disclosed earlier this week that it recorded attempts against D-Link devices to deliver a Mirai botnet variant named "tuxnokill." To mitigate the active threats, Federal Civilian Executive Branch (FCEB) agencies are recommended to apply the fixes or, in the case of CVE-2025-29635, discontinue the use of the appliance by May 8, 2026. Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARE     Tweet Share Share SHARE  botnet, cybersecurity, Infrastructure Security, network security, ransomware, Router, Threat Intelligence Trending News OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads Your MTTD Looks Great. Your Post-Alert Gap Doesn't Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover Why Security Leaders Are Layering Email Defense on Top of Secure Email Gateways The Hidden Security Risks of Shadow AI in Enterprises n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials 108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution Why Threat Intelligence Is the Missing Link in CTEM Prioritization and Validation Load More ▼ Popular Resources How to Identify Risky Browser Extensions in Your Organization Discover Key AI Security Gaps CISOs Face in 2026 Automate Alert Triage and Investigations Across Every Threat Fix Rising Application Security Risks Driven by AI Development
    💬 Team Notes
    Article Info
    Source
    The Hacker News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 26, 2026
    Archived
    Apr 26, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗