Vulnerabilities & CVEs

CISA Adds 4 Exploited Flaws to KEV | Federal Deadline Set

CISA just added four actively exploited vulnerabilities to its dreaded KEV list. Federal agencies better pay attention, or else.

A computer screen displaying code and vulnerability alerts with the CISA logo.

Key Takeaways

  • Four actively exploited vulnerabilities in SimpleHelp, Samsung MagicINFO, and D-Link routers have been added to CISA's Known Exploited Vulnerabilities (KEV) catalog.
  • Federal agencies have a mandatory deadline of May 8, 2026, to address these flaws, with D-Link routers requiring discontinuation.
  • The vulnerabilities include critical flaws like missing authorization, path traversal, and command injection, leading to privilege escalation and arbitrary code execution.

Here’s a number that should make you spill your lukewarm coffee: 9.9. That’s the CVSS score for CVE-2024-57726, a delightful little gem found in SimpleHelp. It’s a missing authorization flaw. Essentially, a low-level technician can just waltz in and give themselves admin privileges. Because, you know, security theater.

And it’s not alone. CISA, bless its bureaucratic heart, has slapped four new entries onto its Known Exploited Vulnerabilities (KEV) catalog. This isn’t some academic exercise, folks. These are vulnerabilities actively being hammered by attackers. Now, remember the KEV list? It’s CISA’s way of saying, “Hey Uncle Sam, patch this now or face the consequences.” And by consequences, they mean a federal deadline.

So, what did CISA uncover this time around?

The Usual Suspects: Remote Code Execution and File Whispering

We’ve got two more SimpleHelp woes: CVE-2024-57726 (the 9.9 monster) and CVE-2024-57728 (a 7.2 path traversal). The latter lets an admin user upload anything anywhere. Zip slip, anyone? It’s a classic. Upload a crafted zip file, get arbitrary code execution. Simple. Elegant. Terrifying.

Then there’s Samsung. Their MagicINFO 9 Server is sporting CVE-2024-7399, a 8.8 path traversal. Attackers can write arbitrary files with system authority. Imagine that. Your fancy digital signage software is now a backdoor.

And finally, the D-Link DIR-823X series routers. Yes, those end-of-life beauties. CVE-2025-29635. A command injection vulnerability. Send a POST request, execute commands. Why bother with complex exploits when you can just ask nicely? Apparently, these are still being actively targeted to deliver Mirai botnet variants. Who knew old tech could be so popular with the riff-raff?

The exploitation of CVE-2024-7399 has been linked to malicious activity deploying the Mirai botnet in the past. As for CVE-2025-29635, Akamai disclosed earlier this week that it recorded attempts against D-Link devices to deliver a Mirai botnet named “tuxnokill.”

Look, these aren’t sophisticated, nation-state zero-days. These are known, exploitable flaws that people are actively abusing. The fact that they’re hitting devices ranging from remote management software to ancient routers tells you everything you need to know about the state of our digital infrastructure. It’s a patchwork quilt held together with duct tape and wishful thinking.

The Federal Mandate: Tick-Tock, May 2026

For the federal government, this isn’t optional. Federal Civilian Executive Branch (FCEB) agencies have until May 8, 2026, to sort this mess out. For the D-Link routers? They need to be chucked. Discontinued use. Gone. For the others, apply the fixes. Easy enough, right? Except when you remember that the federal bureaucracy moves at the speed of tectonic plates.

It’s a bit rich, though, isn’t it? CISA adds these to the KEV list, citing active exploitation and even linking them to ransomware precursors (DragonForce) and botnets (Mirai). Yet, they only issue a deadline over two years away. Are they hoping attackers take a vacation? Or is this just the standard playbook: identify the problem, announce it loudly, and then wait for agencies to eventually do something?

My unique insight here? This constant drip-feed of KEV additions isn’t just about identifying threats; it’s a slow-motion indictment of corporate inertia and a tacit admission from government that they can’t force companies to patch things promptly. They can only mandate deadlines for those they control. The rest of the world? Good luck.

Why Does This Matter for Us Mortals?

Even if you’re not part of the federal machine, this is a wake-up call. The vulnerabilities in SimpleHelp and Samsung MagicINFO are likely found in countless private sector organizations. Remote management tools and content delivery systems are juicy targets. If a low-privileged technician can become an admin, or an attacker can drop files anywhere, your network is basically an open invitation.

And the D-Link routers? They’re a prime example of the IoT security dumpster fire. Manufacturers churn out cheap hardware, slap a label on it, and then abandon it to the wolves. These devices become zombie armies waiting to be activated. They’re often forgotten in closets and server rooms, silently waiting to DDoS your favorite website or serve as a pivot point for a more serious attack.

This isn’t just about compliance. It’s about basic digital hygiene. If you’re using any of these affected products, or similar ones, it’s time to check. Don’t wait for CISA or your boss to tell you. Act now. Your data—and your sanity—might depend on it.

Look, the KEV list is a useful tool. It highlights where the immediate dangers lie. But the real issue is the sheer volume of these vulnerabilities, the persistent exploitation, and the glacial pace of remediation, especially in legacy systems and end-of-life products. CISA can add things to a list, but they can’t magically fix every insecure device out there. That responsibility still falls on the vendors and the users. And frankly, they’ve been dropping the ball for far too long.


🧬 Related Insights

Frequently Asked Questions

What does CISA’s KEV catalog mean?

The Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities that CISA has confirmed are being actively exploited in the wild. Federal agencies are required to patch these flaws within specific timeframes.

Will I be affected if I don’t use SimpleHelp, Samsung MagicINFO, or D-Link routers?

While these specific vulnerabilities affect those products, the underlying issues (path traversal, command injection, missing authorization) are common. It’s a reminder to keep all your software and hardware updated and to regularly assess your own security posture.

Is May 2026 a long time to fix a vulnerability?

For actively exploited vulnerabilities, yes, two years is a considerable amount of time. It highlights potential challenges in remediation for federal agencies, especially concerning older or unsupported hardware like the D-Link routers.

Daniel Reyes
Written by

Security policy correspondent covering government cyber response, legislation, and national security.

Frequently asked questions

What does CISA's KEV catalog mean?
The Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities that CISA has confirmed are being actively exploited in the wild. Federal agencies are required to patch these flaws within specific timeframes.
Will I be affected if I don't use SimpleHelp, Samsung MagicINFO, or D-Link routers?
While these specific vulnerabilities affect those products, the underlying issues (path traversal, command injection, missing authorization) are common. It's a reminder to keep all your software and hardware updated and to regularly assess your own security posture.
Is May 2026 a long time to fix a vulnerability?
For actively exploited vulnerabilities, yes, two years is a considerable amount of time. It highlights potential challenges in remediation for federal agencies, especially concerning older or unsupported hardware like the D-Link routers.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by The Hacker News

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.