CISA Adds VMware vCenter, Zimbra Flaws to Exploited List
Five vulnerabilities added to CISA's KEV catalog this week. VMware vCenter RCE bug patched 18 months ago now seeing active exploitation.
CISA added five vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog this week, requiring federal agencies to patch by mid-February. The additions include a VMware vCenter Server flaw patched over 18 months ago and a December 2025 Zimbra disclosure that attackers wasted no time exploiting.
Under Binding Operational Directive 22-01, federal agencies must remediate these vulnerabilities by the specified due dates. Private organizations aren't bound by the directive, but the KEV catalog serves as a useful prioritization guide—if CISA confirms active exploitation, attackers are likely targeting organizations beyond the federal government.
January 23: VMware vCenter Server
CVE-2024-37079 - Broadcom VMware vCenter Server Out-of-Bounds Write
CVSS: 9.8 | Due date: February 13, 2026
This vulnerability affects vCenter Server's DCERPC protocol implementation. An attacker with network access to vCenter can send specially crafted packets that trigger an out-of-bounds write, potentially leading to remote code execution.
The concerning detail: Broadcom patched this vulnerability in June 2024. Eighteen months later, attackers are exploiting it against organizations that still haven't applied the fix.
VMware vCenter manages ESXi hypervisor environments—compromising it gives attackers control over virtualized infrastructure. The VMware ESXi zero-day campaign by Chinese APT groups we covered earlier this month demonstrates the value attackers place on hypervisor management access.
January 22: Four Enterprise Software Flaws
CVE-2025-68645 - Synacor Zimbra Collaboration Suite PHP Remote File Inclusion
CVSS: 8.8 | Due date: February 12, 2026
Disclosed December 22, 2025, this vulnerability affects Zimbra Collaboration Suite versions 10.0 and 10.1. The Webmail Classic UI's RestFilter servlet improperly handles user-supplied parameters, allowing unauthenticated attackers to include arbitrary files from the WebRoot directory.
Zimbra has a long history as an exploitation target. Organizations running Zimbra should assume they're being scanned for this vulnerability continuously.
CVE-2025-34026 - Versa Concerto Improper Authentication
CVSS: 9.2 | Due date: February 12, 2026
This authentication bypass in Versa Concerto allows command injection, enabling arbitrary code execution. Researchers at ProjectDiscovery reported the issue to Versa in February 2025, and the vendor confirmed a fix in March 2025.
CVE-2025-31125 - Vite Vitejs Improper Access Control
CVSS: 5.3 | Due date: February 12, 2026
Vite is a popular frontend build tool. This access control vulnerability affects organizations using Vite in development or build pipelines.
CVE-2025-54313 - Prettier eslint-config-prettier Embedded Malicious Code
Due date: February 12, 2026
This supply chain compromise embedded malicious code in eslint-config-prettier, a widely-used ESLint configuration package. The addition to KEV confirms exploitation in federal environments—a reminder that supply chain attacks targeting developer tools represent an ongoing threat. We covered a similar n8n supply chain attack compromising OAuth tokens recently.
KEV Catalog Statistics
CISA added 245 vulnerabilities to the KEV catalog in 2025, bringing the total to 1,484. The catalog grows as the agency confirms exploitation of vulnerabilities across the software ecosystem.
The catalog's value lies in its confirmation of active exploitation. Vulnerability disclosures number in the tens of thousands annually, and organizations can't patch everything immediately. KEV entries represent vulnerabilities that attackers are actually using—not theoretical risks, but confirmed threats.
Remediation Priorities
For organizations running affected software:
VMware vCenter: If you haven't patched since June 2024, this is overdue. Check vCenter version and apply cumulative updates. Given the 18-month delay between patch availability and confirmed exploitation, assume attackers have been probing your environment.
Zimbra: Apply patches for CVE-2025-68645 immediately. Zimbra administrators should also review access logs for /h/rest endpoint activity indicating exploitation attempts.
Versa Concerto: Update to patched versions released in March 2025 or later.
Vite: Review your frontend build tooling and update Vite to current versions.
eslint-config-prettier: Audit your package-lock.json for affected versions and update dependencies. Review CI/CD pipeline logs for unexpected behavior.
Federal agencies face February 12-13 deadlines. Everyone else should treat these as urgent priorities—attackers don't wait for compliance deadlines.
For ongoing tracking of vulnerability news and patch priorities, the KEV catalog provides useful signal amid the noise of daily CVE disclosures.
Related Articles
Ivanti EPMM Zero-Days Under Attack, CISA Sets Friday Deadline
Two critical code injection flaws in Ivanti Endpoint Manager Mobile enable unauthenticated RCE. Federal agencies must remediate by February 1.
Jan 30, 2026Microsoft Office Zero-Day Under Active Attack Gets Emergency Patch
CVE-2026-21509 bypasses OLE security protections across Office 2016-2024. CISA adds it to KEV catalog with February 16 deadline.
Jan 27, 2026Microsoft Patches 113 CVEs Including Actively Exploited Zero-Day
January 2026 Patch Tuesday addresses CVE-2026-20805, an info disclosure bug already under attack. CISA gives feds until February 3 to patch.
Jan 14, 2026CISA Adds 16-Year-Old PowerPoint Flaw to Exploited List
January 7 KEV update includes CVE-2009-0556 from 2009 alongside recently patched HPE OneView vulnerability. Both are seeing active exploitation.
Jan 8, 2026