CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert by adding newly identified vulnerabilities affecting ConnectWise and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) Catalog—a strong indicator of real-world cyberattacks currently in progress.

According to recent threat intelligence reports, these vulnerabilities are already being weaponized by advanced threat actors, making immediate remediation essential for enterprises worldwide. (The Hacker News)


🔍 What’s New in the KEV Catalog?

CISA added the following two high-risk vulnerabilities on April 28, 2026:

1. ConnectWise ScreenConnect Vulnerability (CVE-2024-1708)

  • Type: Path Traversal
  • Severity: High (CVSS 8.4)
  • Impact: Remote Code Execution (RCE), unauthorized data access
  • Affected Software: ConnectWise ScreenConnect (≤ v23.9.7)

This flaw allows attackers to manipulate file paths and gain access outside intended directories, potentially enabling full system compromise. It has also been observed being chained with other vulnerabilities to deploy ransomware campaigns. (SC Media)

👉 Learn more from ConnectWise Security Advisory


2. Microsoft Windows Shell Vulnerability (CVE-2026-32202)

  • Type: Protection Mechanism Failure
  • Severity: Medium (CVSS 4.3)
  • Impact: Spoofing, unauthorized network interactions
  • Affected Systems: Microsoft Windows OS

This vulnerability allows attackers to spoof legitimate network resources, potentially leading to credential theft and lateral movement across enterprise environments. It has been linked to nation-state threat groups and targeted campaigns across global regions. (Security Affairs)

👉 Official details available via CISA KEV Catalog


⚠️ Why KEV Inclusion Matters

The KEV catalog is not just a vulnerability list—it is a priority remediation directive. Inclusion means:

  • ✅ Verified active exploitation in the wild
  • ✅ Mandatory patching deadlines for U.S. federal agencies
  • ✅ High likelihood of widespread enterprise targeting

CISA has mandated remediation deadlines (e.g., May 12, 2026), emphasizing urgency across both public and private sectors. (The Hacker News)


🎯 Threat Landscape Insight

Cybercriminal groups, including state-sponsored actors, are increasingly exploiting:

  • Remote Monitoring & Management (RMM) tools like ConnectWise
  • Core operating system components like Windows Shell
  • Multi-stage exploit chains for ransomware deployment

These vulnerabilities are particularly dangerous because they:


🛡️ Recommended Mitigation Strategies

Organizations should take immediate action:

1. Patch Immediately

  • Update ConnectWise ScreenConnect to latest secure versions
  • Apply Microsoft security updates without delay

2. Network Segmentation

  • Limit exposure of RMM tools
  • Restrict internal lateral movement pathways

3. Monitor Indicators of Compromise (IoCs)

  • Watch for unusual file access or execution patterns
  • Monitor spoofed network requests and abnormal authentication flows

4. Zero Trust Implementation

  • Enforce strict identity verification
  • Reduce reliance on implicit trust models

💡 SEIMless Security Perspective

At ibm/SEIMless, we emphasize proactive defense strategies using Quantum-Resistant Network Architectures and AI-driven threat detection to mitigate evolving cyber risks.

The inclusion of these vulnerabilities in KEV reinforces a key cybersecurity principle:

“If it’s in KEV, it’s already too late to delay.”


📢 Call to Action

Don’t wait for exploitation to impact your infrastructure.

👉 Visit https://seimless.com to explore:

  • Advanced Threat Intelligence Solutions
  • Quantum-Resistant Security Frameworks
  • Enterprise-Grade Cyber Defense Strategies

Secure your network before attackers exploit the gap.

Spread the love
Welcome to ibm/SEIMless Communications Technologies, Inc., the home of of Exodus QRN, Inc., a Pioneer and Global leader of Quantum Resistant Networks. ibm/SEIMless and Exodus have gone beyond SASE and SD-WAN to deliver Future Proof answers to today’s most common concerns:

Colo-Public and Private Cloud

Telecom Services

Quantum Resistant Networking

NxT-Gen Network Security

Wide Area Networking

Document Management

MICROSOFT-SAAS-DAAS

Enterprise Technology

PBX Services