The Week in Vulnerabilities: SolarWinds, Ivanti, and Critical ICS Exposure
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在一百个字以内。不需要以“文章内容总结”或者“这篇文章”这样的开头,直接写描述即可。首先,我需要通读整篇文章,抓住主要信息。 文章主要讲的是Cyble Research & Intelligence Labs(CRIL)上周追踪到了1158个漏洞,其中251个已经有公开的PoC,这大大增加了实际攻击的可能性。然后提到有94个漏洞被评为CVSS v3.1的严重级别,43个被评为CVSS v4.0的严重级别。同时,CISA发布了15个ICS公告,涉及87个漏洞,影响了多个工业环境中的厂商。 接下来,文章提到了新增的8个漏洞到CISA的KEV目录中,并列出了几个关键漏洞的情况,比如SolarWinds、Ivanti、Microsoft Office、Keycloak、Apache Druid和SAP CRM/S/4HANA等。这些漏洞都有PoC可用,并且在地下论坛上被讨论过。 然后是关于ICS漏洞的部分,CISA发布了15个ICS公告,涉及87个漏洞,其中大部分被评为高危。还提到了一些具体的工业设备漏洞及其影响。 最后,文章分析了受影响的关键基础设施领域,发现制造业和能源部门占了98.9%的报告漏洞。结论部分强调了组织必须优先进行快速补救和基于风险的漏洞管理,并给出了一些安全最佳实践。 现在需要把这些信息浓缩到100字以内。我应该涵盖主要数据点:追踪到的漏洞数量、PoC的数量、CVSS评分、CISA发布的ICS公告数量及影响的厂商、新增到KEV目录中的漏洞数量以及关键行业受影响的情况。 可能的结构是:上周追踪到1158个漏洞,其中251个有PoC;94/43被评为严重;CISA发布15个ICS公告影响多个厂商;新增8个到KEV;制造业和能源部门受影响最大。 这样大概可以控制在一百字左右。 </think> Cyble上周追踪到1,158个漏洞,其中251个已有公开PoC,94/43分别被评为CVSS v3.1/v4.0严重级,CISA发布15个ICS公告影响多个工业环境,新增8个至KEV目录,制造业和能源部门受影响最大。 2026-2-19 12:15:51 Author: cyble.com(查看原文) 阅读量:8 收藏

Cyble Research & Intelligence Labs (CRIL) tracked 1,158 vulnerabilities last week. Of these, 251 vulnerabilities already have publicly available Proof-of-Concept (PoC) exploits, significantly increasing the likelihood of real-world attacks. 

A total of 94 vulnerabilities were rated critical under CVSS v3.1, while 43 were rated critical under CVSS v4.0.

In parallel, CISA issued 15 ICS advisories covering 87 vulnerabilities affecting industrial environments. These vulnerabilities impacted vendors including Siemens, Yokogawa, AVEVA, Hitachi Energy, ZLAN, ZOLL, and Airleader. 

Additionally, 8 vulnerabilities were added to CISA’s Known Exploited Vulnerabilities (KEV) catalog, reflecting confirmed exploitation in the wild. 

The Week’s Top Vulnerabilities

CVE-2025-40554 — SolarWinds Web Help Desk (Critical) 

CVE-2025-40554 is a critical authentication bypass vulnerability affecting SolarWinds Web Help Desk versions prior to 2026.1. The flaw allows unauthenticated remote attackers to invoke privileged functionality without valid credentials, potentially leading to full compromise of helpdesk systems. 

Cyble observed this vulnerability being discussed on underground forums shortly after disclosure, and a public PoC is available. The vulnerability’s presence in enterprise environments increases the risk of initial access and lateral movement. 

CVE-2026-1340 — Ivanti Endpoint Manager Mobile (Critical) 

CVE-2026-1340 is a critical code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM). A remote, unauthenticated attacker can exploit the flaw to achieve arbitrary remote code execution without user interaction. 

The vulnerability has been captured in dark web discussions and has a publicly available PoC , significantly lowering the barrier to exploitation. 

CVE-2026-21509 — Microsoft Office (High Severity, Actively Exploited) 

CVE-2026-21509 is a feature-bypass vulnerability in Microsoft Office that allows crafted documents to circumvent built-in security protections. Attackers can deliver malicious Office files that execute payloads once opened by the victim. 

The flaw has been actively exploited by threat actors including APT28 and RomCom , highlighting its operational impact. 

CVE-2026-1529 — Keycloak (High Impact) 

CVE-2026-1529 affects Red Hat’s Keycloak and involves improper validation of JWT invitation token signatures. Attackers can manipulate trusted token contents to gain unauthorized access to organizational resources. 

A PoC is available, and the vulnerability surfaced on underground forums shortly after disclosure. 

CVE-2026-23906 — Apache Druid (Critical) 

CVE-2026-23906 is a critical authentication bypass vulnerability in Apache Druid, enabling unauthorized access to sensitive data stores. 

CVE-2026-0488 — SAP CRM & SAP S/4HANA (Critical) 

CVE-2026-0488 is a critical code injection vulnerability affecting SAP CRM and SAP S/4HANA. An authenticated attacker can exploit improper function module calls to execute arbitrary SQL statements, potentially resulting in full database compromise. 

Vulnerabilities Added to CISA KEV

CISA added 8 vulnerabilities to the KEV catalog during the reporting period. The most important of these were: 

  • CVE-2026-24423 — SmarterTools SmarterMail unauthenticated RCE
  • CVE-2026-21510 — Microsoft Windows Shell protection mechanism bypass

KEV additions reflect confirmed exploitation in the wild and often signal heightened ransomware or espionage activity. 

Critical ICS Vulnerabilities

CISA issued 15 ICS advisories covering 87 vulnerabilities, with the majority rated high severity. 

CVE-2026-25084 & CVE-2026-24789 — ZLAN5143D (Critical) 

These critical vulnerabilities in ZLAN Information Technology Co.’s ZLAN5143D device involve missing authentication for critical functions. 

Successful exploitation could allow attackers to bypass authentication controls or reset device passwords, potentially enabling unauthorized configuration changes and interference with industrial communications. Researchers also identified internet-facing instances, increasing exposure risk. 

CVE-2025-52533 — Siemens SINEC OS (Critical) 

CVE-2025-52533 is a critical out-of-bounds write vulnerability in Siemens SINEC OS before version 3.3, potentially enabling memory corruption and system compromise in industrial network environments. 

CVE-2026-1358 — Airleader Master (Critical) 

CVE-2026-1358 is a critical, unrestricted file-upload vulnerability in Airleader Master systems. Successful exploitation could allow attackers to upload malicious files, potentially resulting in remote code execution in OT environments. 

Impacted Critical Infrastructure Sectors

Analysis of the ICS advisories shows that Critical Manufacturing and Energy sectors appear in 98.9% of reported vulnerabilities, showcasing concentrated exposure in these environments. 

The cross-sector nature of these vulnerabilities underscores the interdependencies between Energy, Manufacturing, Transportation, Water, and Food systems. 

Conclusion

The convergence of high-volume IT vulnerabilities and significant ICS exposure highlights the continued expansion of the attack surface across enterprise and industrial environments. With over 250 PoCs publicly available and multiple KEV additions confirming active exploitation, organizations must prioritize rapid remediation and risk-based vulnerability management

Security best practices include: 

  • Prioritizing vulnerabilities based on risk and exploit availability
  • Protecting web-facing and internet-exposed assets
  • Implementing strict IT/OT network segmentation
  • Deploying multi-factor authentication and strong access controls
  • Conducting regular vulnerability assessments and penetration testing
  • Monitoring underground forums and KEV updates for early warning signals
  • Establishing ransomware-resistant backup strategies
  • Maintaining OT-specific incident response procedures

Cyble’s comprehensive attack surface management solutions help organizations continuously monitor internal and external assets, prioritize remediation, and detect early warning signals of exploitation. Additionally, Cyble’s threat intelligence and third-party risk intelligence capabilities provide visibility into vulnerabilities actively discussed in underground communities, enabling proactive defense against both IT and ICS threats.


文章来源: https://cyble.com/blog/cyble-weekly-vulnerability-report-feb-19/
如有侵权请联系:admin#unsafe.sh