CISA threat watch

Known exploited vulnerabilities and urgent federal threat notices.

Vendor watch hub

What this page covers

The CISAwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent CISA activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

1587

Active

1587

Featured

1587

Unique CVEs

20

Most recent entry

Apr 30, 2026, 7:00 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA Known Exploited Vulnerabilities catalog

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent CISA watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability

critical
activeCISA KEVCVE-2026-31431

Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.

Apr 30, 2026, 7:00 PMOfficial source

WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability

critical
activeCISA KEVCVE-2026-41940

WebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared) contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Apr 29, 2026, 7:00 PMOfficial source

ConnectWise ScreenConnect Path Traversal Vulnerability

critical
activeCISA KEVCVE-2024-1708

ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems.

Apr 27, 2026, 7:00 PMOfficial source

Microsoft Windows Protection Mechanism Failure Vulnerability

critical
activeCISA KEVCVE-2026-32202

Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.

Apr 27, 2026, 7:00 PMOfficial source

Samsung MagicINFO 9 Server Path Traversal Vulnerability

critical
activeCISA KEVCVE-2024-7399

Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.

Apr 23, 2026, 7:00 PMOfficial source

D-Link DIR-823X Command Injection Vulnerability

critical
activeCISA KEVCVE-2025-29635

D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Apr 23, 2026, 7:00 PMOfficial source

SimpleHelp Path Traversal Vulnerability

critical
activeCISA KEVCVE-2024-57728

SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.

Apr 23, 2026, 7:00 PMOfficial source

SimpleHelp Missing Authorization Vulnerability

critical
activeCISA KEVCVE-2024-57726

SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.

Apr 23, 2026, 7:00 PMOfficial source

Marimo Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2026-39987

Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands.

Apr 22, 2026, 7:00 PMOfficial source

Microsoft Defender Insufficient Granularity of Access Control Vulnerability

critical
activeCISA KEVCVE-2026-33825

Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally.

Apr 21, 2026, 7:00 PMOfficial source

PaperCut NG/MF Improper Authentication Vulnerability

critical
activeCISA KEVCVE-2023-27351

PaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class. Known ransomware use: Known.

Apr 19, 2026, 7:00 PMOfficial source

JetBrains TeamCity Relative Path Traversal Vulnerability

critical
activeCISA KEVCVE-2024-27199

JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed. Known ransomware use: Known.

Apr 19, 2026, 7:00 PMOfficial source

Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability

critical
activeCISA KEVCVE-2026-20133

Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems.

Apr 19, 2026, 7:00 PMOfficial source

Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability

critical
activeCISA KEVCVE-2026-20122

Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.

Apr 19, 2026, 7:00 PMOfficial source

Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability

critical
activeCISA KEVCVE-2026-20128

Cisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user.

Apr 19, 2026, 7:00 PMOfficial source

Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability

critical
activeCISA KEVCVE-2025-32975

Quest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials.

Apr 19, 2026, 7:00 PMOfficial source

Kentico Xperience Path Traversal Vulnerability

critical
activeCISA KEVCVE-2025-2749

Kentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations.

Apr 19, 2026, 7:00 PMOfficial source

Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability

critical
activeCISA KEVCVE-2025-48700

Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that could allow attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information.

Apr 19, 2026, 7:00 PMOfficial source

Apache ActiveMQ Improper Input Validation Vulnerability

critical
activeCISA KEVCVE-2026-34197

Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.

Apr 15, 2026, 7:00 PMOfficial source

Microsoft Office Remote Code Execution

critical
activeCISA KEVCVE-2009-0238

Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.

Apr 13, 2026, 7:00 PMOfficial source

Related vendors

Other research feeds in the radar

Vendor watch FAQ

Common questions

What is the CISA threat watch page?

It is the CISA-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the CISA watch page?

Use it to confirm whether current CISA issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to CISA security issues?

Yes. ITECS can help map CISA advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.