Protect.Computer
NEWS

CISA flags SolarWinds, Ivanti, and Workspace ONE flaws as actively exploited

· 1 min read · Device safety Network safety

What happened

CISA added three vulnerabilities to the Known Exploited Vulnerabilities (KEV) catalog on March 9, 2026, citing evidence of active exploitation:

  1. CVE-2025-26399 — SolarWinds Web Help Desk deserialization issue (AjaxProxy), potential remote command execution.
  2. CVE-2026-1603 — Ivanti Endpoint Manager authentication bypass that can expose stored credential data.
  3. CVE-2021-22054 — Omnissa (VMware) Workspace ONE UEM SSRF issue that can expose sensitive information.

CISA assigned near-term due dates for U.S. federal civilian agencies, with the SolarWinds fix due first.

Why this matters

  • KEV additions are a strong signal that attackers are using these bugs in real-world operations.
  • The affected products are commonly deployed in enterprise IT management paths.
  • Vulnerabilities tied to management systems can become force multipliers for later movement inside a network.

What defenders should do now

  • Prioritize patching for all three CVEs in vulnerability queues.
  • Audit exposure paths for internet-facing or externally reachable management interfaces.
  • Review logs for suspicious admin actions, unusual request patterns, and authentication anomalies.
  • Segment and restrict access to management tooling to limit blast radius.
  • Track CISA KEV updates daily and align remediation SLAs to active exploitation status.

Bottom line

This is a practical, short-deadline patching event. If your environment uses SolarWinds Web Help Desk, Ivanti EPM, or Workspace ONE UEM, treat these CVEs as active-risk items and move them to the front of the queue.

Related reading