CISA threat watch

Known exploited vulnerabilities and urgent federal threat notices.

Vendor watch hub

What this page covers

The CISAwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent CISA activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

1599

Active

1599

Featured

1599

Unique CVEs

20

Most recent entry

May 19, 2026, 7:00 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA Known Exploited Vulnerabilities catalog

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent CISA watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

Microsoft Windows Buffer Overflow Vulnerability

critical
activeCISA KEVCVE-2008-4250

Microsoft Windows contains a buffer overflow vulnerability in the Windows Server Service that allows remote attackers to execute arbitrary code via a crafted RPC request that triggers an overflow during path canonicalization.

May 19, 2026, 7:00 PMOfficial source

Microsoft Internet Explorer Use-After-Free Vulnerability

critical
activeCISA KEVCVE-2010-0249

Microsoft Internet Explorer contains an use-after-free vulnerability that could allow remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

May 19, 2026, 7:00 PMOfficial source

Microsoft Internet Explorer Use-After-Free Vulnerability

critical
activeCISA KEVCVE-2010-0806

Microsoft Internet Explorer contains an use-after-free vulnerability that could allow remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

May 19, 2026, 7:00 PMOfficial source

Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability

critical
activeCISA KEVCVE-2009-3459

Adobe Acrobat and Reader contain a heap-based buffer overflow vulnerability which could allow remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption.

May 19, 2026, 7:00 PMOfficial source

Microsoft DirectX NULL Byte Overwrite Vulnerability

critical
activeCISA KEVCVE-2009-1537

Microsoft DirectX contains a NULL byte overwrite vulnerability in the QuickTime Movie Parser Filter in quartz.dll in DirectShow which could allow remote attackers to execute arbitrary code via a crafted QuickTime media file.

May 19, 2026, 7:00 PMOfficial source

Microsoft Defender Denial of Service Vulnerability

critical
activeCISA KEVCVE-2026-45498

Microsoft Defender contains an unspecified vulnerability that allows for denial of service.

May 19, 2026, 7:00 PMOfficial source

Microsoft Defender Link Following Vulnerability

critical
activeCISA KEVCVE-2026-41091

Microsoft Defender contains a link following vulnerability that allows an authorized attacker to elevate privileges locally.

May 19, 2026, 7:00 PMOfficial source

Microsoft Exchange Server Cross-Site Scripting Vulnerability

critical
activeCISA KEVCVE-2026-42897

Microsoft Exchange Server contains a cross-site scripting vulnerability during web page generation in Outlook Web Access and when certain interaction conditions are met, arbitrary JavaScript can be executed in the browser context.

May 14, 2026, 7:00 PMOfficial source

Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability

critical
activeCISA KEVCVE-2026-20182

Cisco Catalyst SD-WAN Controller & Manager contain an authentication bypass vulnerability that allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system.

May 13, 2026, 7:00 PMOfficial source

BerriAI LiteLLM SQL Injection Vulnerability

critical
activeCISA KEVCVE-2026-42208

BerriAI LiteLLM contains a SQL injection vulnerability that allows an attacker to read data from the proxy's database and potentially modify it, leading to unauthorized access to the proxy and the credentials it manages.

May 7, 2026, 7:00 PMOfficial source

Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability

critical
activeCISA KEVCVE-2026-6973

Ivanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability that allows a remotely authenticated user with administrative access to achieve remote code execution.

May 6, 2026, 7:00 PMOfficial source

Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability

critical
activeCISA KEVCVE-2026-0300

Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets.

May 5, 2026, 7:00 PMOfficial source

Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability

critical
activeCISA KEVCVE-2026-31431

Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.

Apr 30, 2026, 7:00 PMOfficial source

WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability

critical
activeCISA KEVCVE-2026-41940

WebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared) contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel. Known ransomware use: Known.

Apr 29, 2026, 7:00 PMOfficial source

ConnectWise ScreenConnect Path Traversal Vulnerability

critical
activeCISA KEVCVE-2024-1708

ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems. Known ransomware use: Known.

Apr 27, 2026, 7:00 PMOfficial source

Microsoft Windows Protection Mechanism Failure Vulnerability

critical
activeCISA KEVCVE-2026-32202

Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.

Apr 27, 2026, 7:00 PMOfficial source

Samsung MagicINFO 9 Server Path Traversal Vulnerability

critical
activeCISA KEVCVE-2024-7399

Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.

Apr 23, 2026, 7:00 PMOfficial source

D-Link DIR-823X Command Injection Vulnerability

critical
activeCISA KEVCVE-2025-29635

D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Apr 23, 2026, 7:00 PMOfficial source

SimpleHelp Path Traversal Vulnerability

critical
activeCISA KEVCVE-2024-57728

SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. Known ransomware use: Known.

Apr 23, 2026, 7:00 PMOfficial source

SimpleHelp Missing Authorization Vulnerability

critical
activeCISA KEVCVE-2024-57726

SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role. Known ransomware use: Known.

Apr 23, 2026, 7:00 PMOfficial source

Related vendors

Other research feeds in the radar

Vendor watch FAQ

Common questions

What is the CISA threat watch page?

It is the CISA-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the CISA watch page?

Use it to confirm whether current CISA issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to CISA security issues?

Yes. ITECS can help map CISA advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.