The Week in Vulnerabilities: Juniper, Cisco SD-WAN, and Critical ICS Exposure
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读用户提供的文章内容,找出关键信息。 文章主要讲的是最近在地下论坛上出现了针对Juniper、Cisco SD-WAN和电动汽车充电基础设施的严重漏洞。同时,工业控制系统(ICS)的漏洞也影响了能源和交通部门。Cyble的研究实验室在一周内追踪到了1641个漏洞,其中175个已经有公开的PoC利用代码,这大大增加了实际攻击的可能性。 接下来,文章提到有200个漏洞被评为CVSS v3.1的严重级别,61个被评为CVSS v4.0的严重级别。CISA还添加了多个漏洞到其已知被利用的漏洞目录中,强调了这些漏洞在野外被利用的情况。 在工业方面,CISA发布了9个ICS咨询,涉及24个漏洞,影响了多家厂商。文章还列出了几个关键漏洞的例子,包括Juniper、Cisco、EV充电平台等。最后,文章指出能源和交通系统占ICS漏洞的一半以上,并提出了组织应采取的安全措施。 现在我需要将这些信息浓缩到100字以内。要抓住主要点:地下论坛出现的严重漏洞、涉及的关键系统、漏洞数量及PoC的存在、CISA的行动以及对关键基础设施的影响。 可能的结构是:首先说明问题出现的地方和涉及的关键系统;然后提到追踪到的漏洞数量及PoC的影响;接着提到CISA的动作;最后指出受影响最大的行业。 这样组合起来应该能在字数限制内涵盖主要内容。 </think> 本周报告指出地下论坛出现针对Juniper、Cisco SD-WAN及电动汽车充电设施的严重漏洞,并影响能源与交通部门。研究机构追踪到1641个漏洞,其中175个已有公开利用代码。CISA新增多起被利用漏洞至目录中,并发布9项ICS咨询,涉及24个高危漏洞。能源与交通系统占ICS漏洞一半以上。 2026-3-20 09:3:4 Author: cyble.com(查看原文) 阅读量:6 收藏

Critical Juniper, Cisco SD-WAN, and EV charging infrastructure vulnerabilities surfaced on underground forums, while ICS flaws impacted Energy and Transportation sectors.

Cyble Research & Intelligence Labs (CRIL) tracked 1,641 vulnerabilities between March 04 and March 10, 2026. Of these, 175 vulnerabilities already have publicly available Proof-of-Concept (PoC) exploits, significantly increasing the likelihood of real-world attacks. 

A total of 200 vulnerabilities were rated critical under CVSS v3.1, while 61 received critical severity under CVSS v4.0. 

Additionally, CISA added multiple vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, highlighting confirmed exploitation in the wild, including legacy flaws still actively weaponized in operational environments. 

On the industrial side, CISA issued 9 ICS advisories covering 24 vulnerabilities, affecting vendors including Mitsubishi Electric, Hitachi Energy, Mobiliti, ePower, Everon, and Delta Electronics. 

The Week’s Top Vulnerabilities 

CVE-2026-21902 — Juniper Junos OS (Critical) 

CVE-2026-21902 is a critical authentication bypass and remote code execution vulnerability in Juniper Junos OS Evolved. The flaw exposes an internal anomaly detection service externally, allowing unauthenticated attackers to send crafted requests and execute arbitrary code as root. 

report-ad-banner

A publicly available PoC and underground forum discussions significantly increase the likelihood of exploitation. 

CVE-2026-20127 — Cisco SD-WAN (Critical) 

CVE-2026-20127 is a critical authentication bypass vulnerability affecting Cisco SD-WAN controllers. Due to flawed authentication logic, attackers can bypass peering authentication and gain administrative access over the network. 

Successful exploitation enables traffic manipulation, lateral movement, and persistent access across enterprise networks. 

CVE-2026-29000 — pac4j-jwt Library (Critical) 

CVE-2026-29000 is a critical authentication bypass vulnerability in the pac4j-jwt library. The flaw allows attackers with access to a public key to forge authentication tokens and impersonate any user, including administrators. 

CVE-2026-27971 — Qwik Framework (Critical) 

CVE-2026-27971 is a critical remote code execution vulnerability caused by unsafe deserialization in Qwik’s server-side RPC mechanism. A single malicious request can trigger arbitrary code execution on the backend server. 

CVE-2026-29128 — IDC SFX Satellite Receivers (Critical) 

CVE-2026-29128 involves hardcoded credentials and unauthenticated remote code execution in IDC SFX Series Satellite Receivers. Attackers can extract privileged credentials and execute commands as root, enabling full compromise of satellite communication infrastructure. 

Vulnerabilities Added to CISA KEV 

CISA continued expanding its KEV catalog with vulnerabilities reflecting active exploitation trends. 

Notable additions include: 

  • CVE-2021-22681 — Rockwell Automation credential exposure vulnerability enabling unauthorized OT access 
  • CVE-2017-7921 — Hikvision authentication bypass vulnerability still actively exploited years after disclosure 

These additions highlight the persistent risk of legacy vulnerabilities in both IT and OT environments. 

Critical ICS Vulnerabilities 

CISA issued 9 ICS advisories covering 24 vulnerabilities, with most rated high severity. 

CVE-2026-26051 — Mobiliti EV Charging Platform (Critical) 

CVE-2026-26051 is a critical missing authentication vulnerability in Mobiliti’s EV charging platform, allowing unauthenticated access to infrastructure systems. 

The risk is amplified by the absence of vendor patches or response, requiring organizations to implement independent mitigation controls. 

CVE-2026-22552 — ePower EV Charging Platform (Critical) 

CVE-2026-22552 is a critical authentication bypass vulnerability affecting ePower EV charging systems. Exploitation could enable unauthorized access to the charging infrastructure and service disruption. 

CVE-2026-26288 — Everon Platform (Critical) 

CVE-2026-26288 is a critical missing authentication vulnerability in Everon APIs, allowing attackers to access sensitive backend services without credentials. 

CVE-2026-1775 — Labkotec LID-3300IP (Critical) 

CVE-2026-1775 is a critical missing authentication vulnerability in Labkotec systems, where no fix is available for certain hardware versions, requiring device replacement. 

Impacted Critical Infrastructure Sectors 

Analysis shows that Energy and Transportation Systems account for 50% of ICS vulnerabilities, with Energy appearing in 62.5% of all cases . 

This highlights tightly coupled risks between energy infrastructure and transportation systems, particularly in emerging sectors such as EV charging ecosystems. 

Conclusion 

This week’s findings highlight a convergence of large-scale IT vulnerability disclosures, active exploitation trends, and increasing exposure across industrial environments. 

With 175 publicly available PoCs, active underground discussions, and KEV additions confirming exploitation, organizations must prioritize proactive defense strategies. 

Key recommendations include: 

  • Prioritizing vulnerabilities based on exploit availability and risk 
  • Securing internet-facing assets and critical infrastructure endpoints 
  • Implementing strong authentication and access controls 
  • Segmenting IT and OT environments to limit lateral movement 
  • Replacing or isolating unsupported and unpatched systems 
  • Conducting regular security assessments and penetration testing 

Cyble’s attack surface management solutions enable organizations to identify exposed assets, prioritize remediation, and detect early indicators of compromise. Combined with threat intelligence and third-party risk intelligence, organizations can proactively defend against evolving threats across both IT and ICS environments. 


文章来源: https://cyble.com/blog/cyble-weekly-vulnerabilities-report-mar-19/
如有侵权请联系:admin#unsafe.sh