EXECUTIVE SUMMARY:
CISA has updated its Known Exploited Vulnerabilities (KEV) catalog to include critical zero-day vulnerabilities, highlighting the urgency of proactive vulnerability management. The additions include CVE-2024-55591, an authorization bypass in Fortinet FortiOS allowing super-admin access, and three Microsoft Windows Hyper-V NT Kernel Integration vulnerabilities CVE-2025-21333, CVE-2025-21334, CVE-2025-21335 enabling SYSTEM-level privilege escalation via heap-based buffer overflow and use-after-free exploits. Organizations must prioritize mitigation by applying fixes or discontinuing vulnerable products by the specified deadlines to reduce exposure to exploitation and enhance security resilience.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
CISA has updated its Known Exploited Vulnerabilities (KEV) catalog to include critical zero-day vulnerabilities, highlighting the urgency of proactive vulnerability management. The additions include CVE-2024-55591, an authorization bypass in Fortinet FortiOS allowing super-admin access, and three Microsoft Windows Hyper-V NT Kernel Integration vulnerabilities CVE-2025-21333, CVE-2025-21334, CVE-2025-21335 enabling SYSTEM-level privilege escalation via heap-based buffer overflow and use-after-free exploits. Organizations must prioritize mitigation by applying fixes or discontinuing vulnerable products by the specified deadlines to reduce exposure to exploitation and enhance security resilience.[emaillocker id="1283"]
Organizations must act swiftly to mitigate vulnerabilities listed in CISA's KEV catalog, particularly those affecting Fortinet and Microsoft Windows Hyper-V, to safeguard against potential exploits.
RECOMMENDATION:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335
REFERENCES:
The following reports contain further technical details:
https://cybersecuritynews.com/cisa-adds-fortinet-and-microsoft-zero-day/