The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, signaling confirmed active exploitation in the wild. The additions include a Microsoft Office zero-day being exploited by Russian state-sponsored actors within days of disclosure.

January 26, 2026 additions

CVE IDCVSSProductVulnerability TypeDeadline
CVE-2026-215097.8Microsoft OfficeSecurity Feature BypassFeb 16, 2026
CVE-2018-146347.8Linux KernelInteger OverflowFeb 16, 2026
CVE-2025-526919.8SmarterTools SmarterMailUnrestricted File UploadFeb 16, 2026
CVE-2026-237609.1SmarterTools SmarterMailAuthentication BypassFeb 16, 2026
CVE-2026-240618.1GNU InetUtilsArgument InjectionFeb 16, 2026

CVE-2026-21509: Microsoft Office zero-day

Overview

Microsoft released an out-of-band emergency patch on January 27, 2026, to address CVE-2026-21509, a security feature bypass vulnerability affecting multiple Office products. The vulnerability was added to KEV just one day after disclosure due to confirmed state-sponsored exploitation.

Technical details

AttributeValue
CVECVE-2026-21509
CVSS Score7.8 (High)
CWECWE-357 (Insufficient UI Warning)
Attack VectorLocal (requires user interaction)
ImpactOLE mitigation bypass
User InteractionOpening malicious Office file

The vulnerability stems from the application’s reliance on untrusted inputs when making security decisions, allowing attackers to bypass Object Linking and Embedding (OLE) security mitigations. This exposes users to vulnerable COM/OLE controls that Microsoft had previously blocked.

Discovery credits

OrganizationRole
Microsoft Threat Intelligence Center (MSTIC)Discovery and attribution
Microsoft Security Response Center (MSRC)Vulnerability analysis
Office Product Group Security TeamPatch development
Google Threat Intelligence Group (GTIG)Independent discovery

The joint credit to both Microsoft and Google suggests multiple independent discoveries, likely driven by observed exploitation attempts.

Affected products

ProductStatus
Microsoft Office 2016Interim mitigations available
Microsoft Office 2019Interim mitigations available
Microsoft Office LTSC 2021Patch available
Microsoft Office LTSC 2024Patch available
Microsoft 365 Apps for EnterprisePatch available (service-side)

Active exploitation: Operation Neusploit

Attribution: Microsoft Threat Intelligence Center (MSTIC) confirmed that APT28 (Fancy Bear/UAC-0001)—a Russian GRU-linked threat actor—is actively exploiting CVE-2026-21509.

Campaign attributeDetails
Campaign nameOperation Neusploit
Threat actorAPT28 / Fancy Bear / UAC-0001
AttributionRussia’s GRU (Unit 26165)
Time to weaponization<24 hours after disclosure
TargetsUkraine, Slovakia, Romania
Target count60+ email addresses (CERT-UA)

Attack chain variants

Zscaler ThreatLabz identified two attack chain variants:

VariantPayloadPurpose
Variant 1MiniDoorOutlook email-stealing malware
Variant 2PixyNetLoader → Covenant GruntFull C2 implant

Both variants begin with a specially crafted RTF file that weaponizes CVE-2026-21509 and downloads a malicious dropper DLL from the threat actor’s server.

Remediation

VersionAction
Microsoft 365 / Office 2021+ / LTSCApply final patch immediately
Office 2016Update to 16.0.5539.1001+
Office 2019Update to 16.0.10417.20095+

CVE-2018-14634: Linux kernel integer overflow

Why a 2018 CVE matters now

This addition highlights a critical reality: attackers continue exploiting old vulnerabilities that organizations have overlooked or failed to patch.

AttributeValue
CVECVE-2018-14634
CVSS7.8 (High)
AgeNearly 8 years old
TypeInteger overflow in create_elf_tables()
ImpactLocal privilege escalation
Root causeUnpatched legacy systems

CVE-2018-14634 is an integer overflow in the Linux kernel’s create_elf_tables() function that can lead to privilege escalation. Despite being nearly eight years old, active exploitation demonstrates that unpatched systems remain targets.

Affected distributions

DistributionStatus
Red Hat Enterprise Linux 6EOL, no patches
Red Hat Enterprise Linux 7Patch available
CentOS 6/7Mirror RHEL status
Oracle LinuxPatch available
DerivativesCheck vendor advisories

Why old CVEs persist

FactorExplanation
Legacy systemsProduction systems that “can’t” be updated
Air-gapped environmentsInfrequent patching cycles
EOL softwareNo patches available
Patch fatigueOld CVEs deprioritized
Unknown inventorySystems forgotten by IT

Organizations cannot assume old CVEs are no longer relevant. Attackers specifically target known vulnerabilities hoping patches have been missed.

SmarterMail vulnerabilities

Two critical flaws in SmarterTools SmarterMail, a popular email server platform:

CVE-2025-52691: Unrestricted file upload

AttributeValue
CVSS9.8 (Critical)
TypeUnrestricted file upload
AuthenticationNone required
ImpactRemote code execution

Allows unauthenticated attackers to upload arbitrary files, potentially achieving remote code execution on the mail server.

CVE-2026-23760: Authentication bypass

AttributeValue
CVSS9.1 (Critical)
TypeAuthentication bypass
AuthenticationNone required
ImpactFull administrative access

Enables attackers to bypass authentication mechanisms entirely, gaining administrative access to the email platform.

Combined impact

Email servers are high-value targets. Compromise provides access to:

AssetRisk
Email contentBusiness communications, sensitive data
AttachmentsDocuments, credentials
Contact listsPhishing target identification
CredentialsPassword reuse across systems
Internal communicationsBusiness intelligence
Launching pointBEC, lateral movement

CVE-2026-24061: GNU InetUtils argument injection

AttributeValue
CVECVE-2026-24061
CVSS8.1 (High)
ProductGNU InetUtils
TypeArgument injection
ImpactCommand execution

An argument injection vulnerability in GNU InetUtils (commonly used networking utilities including ftp, telnet, rsh, rlogin) that can be exploited for command execution.

Affected utilities

UtilityCommon use
ftpFile transfer
telnetRemote access
rshRemote shell
rloginRemote login
tftpTrivial file transfer

Compliance requirements

Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies must remediate KEV catalog vulnerabilities by specified due dates.

DeadlineVulnerabilitiesScope
February 16, 2026All five January 26 additionsFCEB agencies

BOD 22-01 requirements

RequirementDetails
ScopeAll FCEB agencies
ComplianceMandatory, not optional
TimelineSpecified per vulnerability
ReportingAgency-level tracking
ExceptionsLimited, require approval

Private sector guidance

While BOD 22-01 only applies to federal agencies, CISA strongly recommends all organizations:

ActionRationale
Prioritize KEV vulnerabilitiesConfirmed real-world attack vectors
Use KEV for patch prioritizationNot all CVEs are equal
Track KEV additionsSubscribe to CISA alerts
Integrate into vuln managementAutomated prioritization
Reduce remediation windowsKEV items shouldn’t wait for normal cycles

Earlier January 2026 KEV additions

January 22, 2026 additions

CVE IDProductIssue
CVE-2026-21798ViteBuild tool vulnerability
CVE-2026-20103Versa ConcertoNetwork management flaw
CVE-2026-19842eslint-config-prettierSupply chain compromise
CVE-2026-18731Zimbra Collaboration SuiteEmail platform vulnerability

The eslint-config-prettier entry is notable—it represents supply chain compromise where malicious code was embedded in a legitimate npm package, demonstrating that KEV now tracks software supply chain attacks.

KEV catalog statistics

MetricValue
Total KEV entries1,200+
2026 additions (YTD)45+
Average monthly additions15-20
Covered vendors200+
Age range2002-2026

Recommendations

For security teams

PriorityAction
ImmediatePatch CVE-2026-21509 across all Office installations
ImmediateVerify SmarterMail patching status
HighAudit for CVE-2018-14634 on Linux systems
HighReview GNU InetUtils deployments
OngoingMonitor KEV catalog for additions

For vulnerability management programs

PracticeImplementation
KEV integrationFlag KEV entries for priority remediation
Reduced SLAsKEV items should not wait for normal patch cycles
Coverage trackingReport on KEV vulnerability closure rates
Historical reviewScan for older KEV entries that may have been missed
Automated alertingSubscribe to CISA KEV RSS/JSON feeds

Detection guidance

VulnerabilityDetection approach
CVE-2026-21509RTF files with OLE objects from external sources
CVE-2018-14634Kernel version auditing, privilege escalation monitoring
SmarterMail CVEsWeb application scanning, auth log monitoring
CVE-2026-24061InetUtils version checking

Context

The KEV catalog has become a critical prioritization tool for vulnerability management. Unlike CVSS scores alone—which measure theoretical severity—KEV entries represent confirmed exploitation, making them reliable indicators of real-world risk.

KEV advantageExplanation
Confirmed exploitationNot theoretical risk
Continuous updatesReal-time threat intelligence
Clear deadlinesActionable timelines
Cross-vendor coverageComprehensive scope
Free resourceNo subscription required

The January 26 additions demonstrate the catalog’s value:

  • APT28 exploitation of CVE-2026-21509 shows state-sponsored targeting within days of disclosure
  • CVE-2018-14634 proves old vulnerabilities remain dangerous
  • SmarterMail flaws highlight risks in commonly overlooked infrastructure
  • Supply chain entries expand KEV’s scope beyond traditional vulnerabilities

Organizations should treat KEV additions as actionable intelligence requiring immediate attention, not just another item in the patching queue. The rapid weaponization of CVE-2026-21509 by APT28—within 24 hours of disclosure—demonstrates that patch windows are shrinking for high-value vulnerabilities.