Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202604-00000027
[Content Description]
【CVE-2026-20122】Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability (CVSS v3.1: 5.4)
【Exploitation by Ransomware: Unknown】 A vulnerability exists in Cisco Catalyst SD-WAN Manager involving the incorrect use of privileged APIs. Attackers can exploit this vulnerability by uploading malicious files to the local file system. Successful exploitation allows attackers to overwrite arbitrary files on the affected system and gain vmanage user privileges.
【CVE-2026-20133】Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVSS v3.1: 6.5)
【Exploited by Ransomware: Unknown】 A vulnerability exists in Cisco Catalyst SD-WAN Manager that exposes sensitive information to an unauthorized party, potentially allowing a remote attacker to view sensitive information on an affected system.
【CVE-2025-2749】Kentico Xperience Path Traversal Vulnerability (CVSS v3.1: 7.2)
【Exploited by Ransomware: Unknown】 A path traversal vulnerability exists in Kentico Xperience that could allow an authenticated user's Staging Sync Server to upload arbitrary data to a relative path location.
【CVE-2023-27351】PaperCut NG/MF Improper Authentication Vulnerability (CVSS v3.1: 8.2)
【Ransomware Exploitation: Known】 PaperCut NG/MF contains an improper authentication vulnerability that could allow a remote attacker to bypass authentication on an affected installation via the SecurityRequestFilter class.
【CVE-2025-48700】Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability (CVSS v3.1: 6.1)
【Ransomware Exploitation: Unknown】 Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that could allow an attacker to execute arbitrary JavaScript during user workflows, resulting in unauthorized access to sensitive information.
【CVE-2026-20128】Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability (CVSS v3.1: 7.5)
【Exploited by Ransomware: Unknown】 A vulnerability exists in Cisco Catalyst SD-WAN Manager that stores passwords in a recoverable format. This vulnerability allows an authenticated local attacker to access the credential file of a DCA user in the file system with low-privilege privileges, thereby gaining DCA user privileges.
【CVE-2025-32975】Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability (CVSS v3.1: 10.0)
【Exploited by Ransomware: Unknown】 A vulnerability exists in Quest KACE Systems Management Appliance (SMA) that allows an attacker to impersonate a legitimate user without valid credentials.
[Affected Platforms]
【CVE-2026-20122】Please refer to the official list of affected versions: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
【CVE-2026-20133】Please refer to the official list of affected versions: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
【CVE-2025-2749】Kentico Xperience versions 13.0.178 and earlier
【CVE-2023-27351】Please refer to the official list of affected versions: https://www.papercut.com/kb/Main/PO-1216-and-PO-1219 [CVE-2025-48700] Please refer to the official affected versions listed here: https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
【CVE-2026-20128】Please refer to the official affected versions listed here: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
【CVE-2025-32975】Please refer to the official affected versions listed here. https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978
[Recommended Actions]
【CVE-2026-20122】 An official patch update has been released for this vulnerability. Please update to the relevant version. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
【CVE-2026-20133】 An official patch update has been released for this vulnerability. Please update to the relevant version. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
【CVE-2025-2749】 An official patch update has been released for this vulnerability. Please update to the relevant version. https://devnet.kentico.com/download/hotfixes
【CVE-2023-27351】 An official patch update has been released for this vulnerability. Please update to the relevant version. https://www.papercut.com/kb/Main/PO-1216-and-PO-1219
【CVE-2025-48700】 An official patch update has been released for this vulnerability. Please update to the relevant version. https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
【CVE-2026-20128】 The official patch for the vulnerability has been released. Please update to the relevant version: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
【CVE-2025-32975】 The official patch for the vulnerability has been released. Please update to the relevant version: https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978