CISA Adds FileZen CVE-2026-25108 to KEV After Active Exploitation
CISA flags FileZen command injection flaw (CVE-2026-25108, CVSS 8.7) as actively exploited. Federal agencies must patch by March 17, 2026.
CISA added an actively exploited command injection vulnerability in Soliton Systems' FileZen file transfer appliance to its Known Exploited Vulnerabilities catalog on February 24, 2026. Federal civilian executive branch agencies now face a March 17 deadline to apply patches.
The vulnerability, tracked as CVE-2026-25108, carries a CVSS v4 score of 8.7 and allows authenticated attackers to execute arbitrary operating system commands through specially crafted HTTP requests. Soliton confirmed receiving "at least one report of damage caused by the exploitation of this vulnerability."
Technical Details
FileZen is a file-sharing and secure data transfer appliance manufactured by Japanese vendor Soliton Systems K.K. The product is popular among enterprises needing to transfer sensitive files between internal systems and external partners.
The command injection flaw exists when the FileZen Antivirus Check Option is enabled. An authenticated user can submit a malicious HTTP request that injects OS commands into the antivirus scanning process. Those commands execute with the privileges of the FileZen service account.
Affected versions:
- FileZen 4.2.1 through 4.2.8
- FileZen 5.0.0 through 5.0.10
FileZen S is not affected by this vulnerability.
Exploitation Requirements
Successful attacks require three conditions:
- Valid credentials - The attacker must authenticate to the FileZen web interface
- Antivirus scanning enabled - The target instance must have the Antivirus Check Option turned on
- Crafted HTTP request - A specifically formatted request triggers the injection
The authentication requirement limits opportunistic mass exploitation. But given that file transfer appliances often sit at network perimeters and handle sensitive data, attackers with stolen credentials can quickly pivot to full system compromise.
File transfer appliances have become prime targets for threat actors. We've seen similar patterns with SolarWinds vulnerabilities and other enterprise file transfer tools that attackers exploit to stage data theft and ransomware deployment.
Why This Matters
Soliton's confirmation of real-world attacks means this isn't theoretical. Someone is actively exploiting FileZen instances right now.
File transfer appliances are high-value targets because they process sensitive documents moving between organizations. Compromising one gives attackers access to everything flowing through it, plus a foothold inside the network perimeter.
CISA's KEV catalog addition signals they have credible intelligence about exploitation. Under BOD 22-01, federal agencies must remediate KEV vulnerabilities within the specified deadline. Private sector organizations should treat KEV additions as urgent regardless of regulatory requirements.
Recommended Mitigations
Soliton released version 5.0.11 to address the vulnerability. Organizations running affected versions should:
- Update immediately to FileZen 5.0.11 or later
- Reset all user passwords as a precaution, since attackers accessed legitimate accounts
- Review access logs for suspicious authentication patterns or unusual file transfers
- Disable antivirus scanning temporarily if patching isn't immediately possible (reduces attack surface but removes malware protection)
- Segment network access to limit who can reach the FileZen management interface
For organizations still using legacy appliance-based file transfer tools, this incident reinforces why edge device security remains a persistent challenge. CISA's binding operational directive on edge device replacement reflects growing recognition that aging perimeter appliances represent systemic risk.
Related Articles
CISA Confirms VMware ESXi Flaw Used in Ransomware
CVE-2025-22225 sandbox escape now confirmed as a ransomware attack vector. Exploitation toolkit predates Broadcom's patch by a full year.
Feb 6, 2026SmarterMail Flaw Exploited in Ransomware Attacks
CVE-2026-24423 lets unauthenticated attackers execute OS commands on SmarterMail servers. CISA confirms active ransomware exploitation and sets a February 26 patch deadline.
Feb 6, 2026CISA KEV Deadline Hits Today for Unpatched Gogs Zero-Day
CVE-2025-8110 allows authenticated attackers to achieve RCE on self-hosted Git servers via path traversal. Over 700 instances already compromised.
Feb 2, 2026SmarterMail Auth Bypass Lets Attackers Reset Admin Passwords
CVE-2026-23760 enables unauthenticated admin takeover in SmarterMail. Exploitation began two days after patch release.
Jan 27, 2026