🚨 CRITICAL ALERT: Active Zero-Day Exploits
Attention all cybersecurity stakeholders: multiple critical vulnerabilities with significant impact potential are currently being exploited in the wild. Organizations must act immediately to secure their systems against these threats, which could lead to unauthorized access, data breaches, and remote code execution. The vulnerabilities, scoring a CVSS of 8.0 or higher, are actively being leveraged by malicious actors and are part of CISA’s Known Exploited Vulnerabilities catalog.
Critical Vulnerabilities (CVSS >= 8.0)
- CVE-2017-7921 (CVSS: 9.8): An Improper Authentication issue in several Hikvision device series allows escalated privileges and sensitive information access. View NVD | CISA KEV
- CVE-2021-22681 (CVSS: 9.8): Vulnerability in Rockwell Automation systems permitting unauthenticated attacker access, impacting numerous Logix controllers. View NVD | CISA KEV
- CVE-2025-54236 (CVSS: 9.1): Improper Input Validation in Adobe Commerce could lead to session takeover, affecting the confidentiality and integrity of data. View NVD | CISA KEV
- CVE-2023-43000 (CVSS: 8.8): Use-after-free vulnerability in Apple’s macOS and iOS causing potential memory corruption, triggered by malicious web content. View NVD | CISA KEV
- CVE-2026-22719 (CVSS: 8.1): Command injection in VMware Aria Operations could lead to remote code execution during product migration. View NVD | CISA KEV
âš¡ Immediate Actions Required
Organizations must prioritize the immediate review and application of security patches for affected software. For CVE-2026-22719, consult the ‚Response Matrix‘ in VMSA-2026-0001 for patch and workaround guidance. Upgrade systems vulnerable to CVE-2023-43000 to the latest versions of macOS Ventura, iOS, and iPadOS 16.6. Additionally, ensure all authentication systems for Rockwell Automation and Hikvision devices are reinforced to prevent unauthorized access. Regularly update security protocols and monitor network traffic for suspicious activity to mitigate potential breaches caused by these vulnerabilities.

