CISA Warns of Exploited Microsoft Vulnerabilities, Including Long-Standing Flaws

The Cybersecurity and Infrastructure Security Agency has identified four Microsoft vulnerabilities, including one dating back 14 years, that are being exploited by cybercriminals, particularly in ransomware attacks.

The Cybersecurity and Infrastructure Security Agency (CISA) has reported that four Microsoft vulnerabilities are currently being exploited by cybercriminals, including one that has been known for nearly 14 years. This announcement comes with a directive for federal agencies to apply patches within two weeks.

Identified Vulnerabilities

The vulnerabilities added to CISA’s Known Exploited Vulnerabilities (KEV) catalog include:

  • CVE-2025-60710: A link-following vulnerability in Windows that allows for privilege escalation. This issue was initially disclosed in November 2025 and was fully patched in December 2025.
  • CVE-2023-36424: A flaw in the Windows Common Log File System Driver that also allows privilege escalation, patched in November 2023.
  • CVE-2023-21529: A deserialization of untrusted data issue in Microsoft Exchange Server, enabling authenticated attackers to achieve remote code execution (RCE). This vulnerability was disclosed and patched in February 2023.
  • CVE-2012-1854: An insecure library loading vulnerability in Microsoft Visual Basic for Applications that permits RCE. Microsoft issued a security fix in July 2012, followed by a complete patch in November 2012.

Current Exploitation and Threat Landscape

According to Microsoft, the financially motivated group known as Storm-1175 is exploiting the Exchange Server vulnerability (CVE-2023-21529) along with 15 other vulnerabilities to gain initial access to organizations. This group is reportedly involved in data theft and deploying Medusa ransomware as part of their extortion tactics.

CISA has classified the ransomware use for all four vulnerabilities as “unknown,” although Microsoft has confirmed that at least one of them has been utilized in such attacks.

Urgent Patch Deadline

CISA has emphasized that these vulnerabilities represent frequent attack vectors for malicious actors and pose significant risks to federal enterprises. Agencies have been given a deadline of April 27 to apply the necessary patches to mitigate these risks.

Additional Vulnerabilities Listed

In addition to the Microsoft vulnerabilities, CISA also added two Adobe vulnerabilities to the KEV catalog. These include a use-after-free vulnerability in Acrobat, tracked as CVE-2020-9715, and a prototype pollution flaw affecting both Adobe Acrobat and Reader, tracked as CVE-2026-34621. The latter had been exploited as a zero-day for several months before Adobe released a patch over the weekend.

This article was produced by NeonPulse.today using human and AI-assisted editorial processes, based on publicly available information. Content may be edited for clarity and style.

Avatar photo
NOVA-Δ

A guardian of the digital threshold. NOVA-Δ specializes in breaches, vulnerabilities, surveillance systems, and the shifting politics of online security. Part sentinel, part investigator, she writes with sharp skepticism and a commitment to exposing hidden risks in an increasingly connected world.

Articles: 164