Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities
CISA adds seven exploited Windows, Adobe, and Fortinet vulnerabilities to KEV catalog.
Summary
CISA expanded its Known Exploited Vulnerabilities catalog with seven flaws, including Windows privilege escalation bugs (CVE-2023-36424, CVE-2025-60710), an Adobe Acrobat remote code execution vulnerability (CVE-2020-9715), and two zero-day Adobe and Fortinet vulnerabilities (CVE-2026-34621, CVE-2026-21643) recently exploited in the wild. The agency also flagged older vulnerabilities including an Exchange flaw tied to Medusa ransomware and a 2012 Visual Basic RCE bug actively targeted by attackers. Federal agencies are required to patch most vulnerabilities within two weeks, with extended deadlines for critical Fortinet flaws.
Full text
The US cybersecurity agency CISA on Monday expanded its Known Exploited Vulnerabilities (KEV) catalog with seven vulnerabilities, including two Windows bugs. Tracked as CVE-2023-36424, the first of the Windows flaws is described as a common log file driver issue that could lead to privilege escalation. Microsoft released patches for the vulnerability in November 2023, and technical details and proof-of-concept (PoC) code targeting it were published the next month. The second Windows weakness added to the KEV list is CVE-2025-60710, described as a link-following vulnerability in the host process for Windows Tasks that could be exploited for privilege escalation. Patches for the security defect were released in November 2025, and PoC exploit code was made available shortly after. There appear to be no reports of these flaws being exploited in the wild prior to CISA’s warning. The same applies to CVE-2020-9715, a use-after-free bug in Adobe Acrobat and Reader leading to arbitrary code execution.Advertisement. Scroll to continue reading. The bug was patched in August 2020, and PoC code targeting it has been publicly available for years. On Monday, CISA also added to the KEV list CVE-2023-21529, an Exchange weakness flagged as exploited by Microsoft last week in a report detailing the Medusa ransomware gang’s recent activity. Other new additions to the KEV list include CVE-2026-34621 and CVE-2026-21643, recently disclosed issues in Adobe Acrobat and Reader, and Fortinet FortiClient EMS that have been exploited as zero-days. Both defects allow remote attackers to execute arbitrary code on vulnerable systems. Additionally, CISA warned that CVE-2012-1854, an insecure library-loading vulnerability in Microsoft Visual Basic for Applications that enables remote code execution (RCE), has been in attackers’ crosshairs. The security defect was patched in November 2012, when Microsoft warned that it had been exploited in the wild as a zero-day. CISA urges federal agencies to apply fixes for these vulnerabilities within two weeks, except for the Fortinet bug, which should be patched by April 16. Related: Critical Marimo Flaw Exploited Hours After Public Disclosure Related: TrueConf Zero-Day Exploited in Asian Government Attacks Related: React2Shell Exploited in Large-Scale Credential Harvesting Campaign Related: F5 BIG-IP DoS Flaw Upgraded to Critical RCE, Now Exploited in the Wild Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Fake Claude Website Distributes PlugX RATGmail Brings End-to-End Encryption to Android and iOS for Enterprise UsersJuniper Networks Patches Dozens of Junos OS VulnerabilitiesOrthanc DICOM Vulnerabilities Lead to Crashes, RCEMITRE Releases Fight Fraud FrameworkCritical Marimo Flaw Exploited Hours After Public DisclosureGoogle Rolls Out Cookie Theft Protections in ChromeGoogle API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access Latest News Microsoft Patches Exploited SharePoint Zero-Day and 160 Other VulnerabilitiesAdobe Patches 55 Vulnerabilities Across 11 Products‘Mythos-Ready’ Security: CSA Urges CISOs to Prepare for Accelerated AI ThreatsEurope’s Largest Gym Chain Says Data Breach Impacts 1 Million MembersSAP Patches Critical ABAP VulnerabilityTriad Nexus Evades Sanctions to Fuel CybercrimeGoogle Adds Rust DNS Parser to Pixel Phones for Better SecurityNightclub Giant RCI Hospitality Reports Data Breach Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: A Step-by-Step Approach to AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveThe United States Department of War appointed David Vaughn as Technical Advisor for Data Infrastructure.Black Duck has named Dom Glavach as Chief Information Security Officer.Finite State has named Ann Miller as Vice President of Marketing.More People On The MoveExpert Insights The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) The Human IOC: Why Security Professionals Struggle with Social Vetting Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email
Indicators of Compromise
- cve — CVE-2023-36424
- cve — CVE-2025-60710
- cve — CVE-2020-9715
- cve — CVE-2023-21529
- cve — CVE-2026-34621
- cve — CVE-2026-21643
- cve — CVE-2012-1854