April 17, 2026
By esentry Team

Active Exploitation of Critical Vulnerabilities Across Enterprise Platforms

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority update to its Known Exploited Vulnerabilities (KEV) Catalog, adding six vulnerabilities affecting widely used enterprise technologies.

This inclusion confirms active exploitation in real-world environments, with threat actors targeting endpoint management systems, email infrastructure, Windows components, and document processing software to achieve remote code execution (RCE), privilege escalation, and initial access for ransomware deployment.

Organizations leveraging these technologies should treat this as an immediate remediation priority.

Affected Technologies & Vulnerability Breakdown

Fortinet FortiClient EMS

  • CVE: CVE-2026-21643
  • Vulnerability Type: SQL Injection  

A critical SQL injection flaw in FortiClient Endpoint Management Server (EMS) allows attackers to send specially crafted HTTP requests to execute arbitrary database queries.

Active exploitation has been observed since March 2026, indicating that attackers are actively scanning and weaponizing this vulnerability in the wild.

Adobe Acrobat Reader

  • CVE: CVE-2020-9715
  • Vulnerability Type: Use-After-Free  

Description

A memory corruption flaw triggered when processing specially crafted PDF files.

Microsoft Windows Common Log File System (CLFS) Driver

  • CVE: CVE-2023-36424
  • Vulnerability Type: Out-of-Bounds Read  

Description

Improper memory handling within the CLFS driver allows attackers to manipulate memory structures.

Microsoft Exchange Server

  • CVE: CVE-2023-21529
  • Vulnerability Type: Insecure Deserialization  

Description

Improper handling of untrusted serialized data allows attackers to execute arbitrary code. This vulnerability is being actively weaponized by a threat actor tracked as Storm-1175, linked to ransomware deployment campaigns, including Medusa ransomware operations.

Windows Host Process for Tasks

  • CVE: CVE-2025-60710
  • Vulnerability Type: Improper Link Resolution  

Description

Improper validation of file paths allows attackers to manipulate file access operations.

Microsoft Visual Basic for Applications (VBA)

  • CVE: CVE-2012-1854
  • Vulnerability Type: Insecure Library Loading  

Description

A legacy vulnerability that allows malicious DLLs to be loaded by trusted applications.

Although originally disclosed in 2012, this vulnerability continues to be leveraged in targeted and modern attack chains, highlighting risks from unpatched legacy components.

Remediation Timeline

CISA has mandated that all Federal Civilian Executive Branch (FCEB) agencies must remediate these vulnerabilities by: April 27, 2026

Organizations outside this scope are strongly advised to follow the same timeline due to confirmed exploitation activity.

Mitigations

Monitor for:

  • Suspicious HTTP requests targeting Fortinet EMS
  • Unusual processes on Exchange servers
  • Abnormal privilege escalation activity on endpoints

Enable logging for:

  • Authentication attempts
  • Process creation events
  • Network anomalies

Apply vendor security patches and updates across all affected systems.

Prioritize internet-facing and critical infrastructure assets.

Conduct enterprise-wide vulnerability scans.