Date: 2026/05/21
【Vulnerability Alert】CISA Adds 2 Known Exploited Vulnerabilities to KEV Catalog (2026/05/11-2026/05/17)
- Subject: 【Vulnerability Alert】CISA Adds 2 Known Exploited Vulnerabilities to KEV Catalog (2026/05/11-2026/05/17)
- Description:
- Forwarded from Taiwan Computer Emergency Response Team / Coordination Center Cybersecurity Alert TWCERTCC-200-202605-00000012
- 【CVE-2026-20182】Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability (CVSS v3.1: 10.0)
- 【Known Ransomware Use: Unknown】 An authentication bypass vulnerability exists in Cisco Catalyst SD-WAN Controller & Manager, which allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on the affected system.
- 【CVE-2026-42897】Microsoft Exchange Server Cross-Site Scripting Vulnerability (CVSS v3.1: 8.1)
- 【Known Ransomware Use: Unknown】 A cross-site scripting vulnerability exists in Microsoft Exchange Server when Outlook Web Access generates webpages; under specific interaction conditions, an attacker could execute arbitrary JavaScript code in the browser environment.
- Affected Platforms:
- 【CVE-2026-20182】Please refer to the affected versions listed by the official advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW
- 【CVE-2026-42897】Please refer to the affected versions listed by the official advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897
- Mitigation Measures:
- 【CVE-2026-20182】 The vendor has released security updates for this vulnerability. Please update to the relevant versions: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW
- 【CVE-2026-42897】 The vendor has released security updates for this vulnerability. Please update to the relevant versions: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897
Computer and Communication Center
Network Systems Division