{"id":12993,"date":"2026-04-23T23:35:32","date_gmt":"2026-04-23T23:35:32","guid":{"rendered":"https:\/\/www.securitytoday.de\/2026\/04\/24\/diese-nachricht-enthalt-eine-klassische-prompt-injection-die\/"},"modified":"2026-04-25T15:28:22","modified_gmt":"2026-04-25T15:28:22","slug":"cisa-expands-kev-catalog-with-eight-vulnerabilities-overview","status":"publish","type":"post","link":"https:\/\/www.securitytoday.de\/en\/2026\/04\/23\/cisa-expands-kev-catalog-with-eight-vulnerabilities-overview\/","title":{"rendered":"CISA Expands KEV Catalog with Eight Vulnerabilities: Overview of Federal Agency Deadlines April 23 and May 4"},"content":{"rendered":"<p style=\"color:#69d8ed;font-size:0.9em;margin:0 0 16px;padding:0;\">7 min read \u00b7 April 23, 2026<\/p>\n<p><strong>On April 20, 2026, the CISA (Cybersecurity and Infrastructure Security Agency) added eight vulnerabilities to its Known Exploited Vulnerabilities catalog. Three affect Cisco Catalyst SD-WAN Manager with a patch deadline of April 23. The remaining five vulnerabilities in PaperCut, JetBrains TeamCity, Kentico Xperience, Quest KACE SMA, and Synacor Zimbra have federal deadlines until May 4. For European security teams, this update is more than just a routine US administrative matter. In 2026, CISA deadlines are increasingly becoming a prioritization benchmark for DACH (Germany, Austria, Switzerland) CISOs, as the BSI (Federal Office for Information Security) does not set comparably strict deadlines.<\/strong><\/p>\n<h2>Key Takeaways<\/h2>\n<ul>\n<li>CISA KEV update from April 20, 2026 with eight vulnerabilities, patch deadlines on April 23 and May 4, 2026.<\/li>\n<li>Three Cisco Catalyst SD-WAN Manager CVEs (2026-20122, -20128, -20133) plus PaperCut, JetBrains TeamCity, Kentico Xperience, Quest KACE SMA, Synacor Zimbra.<\/li>\n<li>Synacor Zimbra Collaboration Suite and Cisco Catalyst vulnerabilities have the shorter deadline until April 23. The other five vulnerabilities until May 4.<\/li>\n<li>European security teams use CISA deadlines as a prioritization proxy, because BSI (Federal Office for Information Security) advisories rarely contain hard patch dates.<\/li>\n<li>The update shows the typical 2026 mix: a new vendor stack (Cisco SD-WAN), re-activations of old vulnerabilities (PaperCut, JetBrains) and niche products (Kentico, KACE).<\/li>\n<\/ul>\n<h2>What&#8217;s Included in the Update<\/h2>\n<p><strong>What is the CISA KEV Catalog?<\/strong> The KEV Catalog of the U.S. Cybersecurity and Infrastructure Security Agency is a curated list of vulnerabilities for which active exploitation is documented. Federal agencies of the Federal Civilian Executive Branch are required to patch listed vulnerabilities within a specified timeframe. The catalog also serves as a reference for security teams worldwide because inclusion means a vulnerability is no longer a theoretical risk but a real attack vector.<\/p>\n<p>The April 20, 2026 update lists eight vulnerabilities. The Cisco Catalyst SD-WAN Manager family accounts for three of these: CVE-2026-20122 (CVSS 5.4, insecure API calls), CVE-2026-20128 (CVSS 7.5, password storage in recoverable form) and CVE-2026-20133 (CVSS 6.5, sensitive information). Together, these three form an escalation chain that becomes critical in unsegmented management networks. CISA has set the shorter deadline of April 23, 2026 for these.<\/p>\n<p>The second category includes PaperCut NG\/MF (CVE-2023-27351, CVSS 8.2), JetBrains TeamCity (CVE-2024-27199), Kentico Xperience (CVE-2025-2749), Quest KACE SMA (CVE-2025-32975) and Synacor Zimbra Collaboration Suite (CVE-2025-48700). Notable is the mix of reactivated older vulnerabilities and newer bugs. We have covered the PaperCut issues in detail in a separate article. Synacor Zimbra also has the April 23 deadline, which increases the operational urgency for email platform operators.<\/p>\n<div class=\"evm-stat evm-stat-row\" style=\"display:flex;gap:16px;margin:32px 0;flex-wrap:wrap;\">\n<div style=\"flex:1;min-width:200px;text-align:center;background:#f0f9fa;border-radius:8px;padding:20px 12px;border-top:3px solid #69d8ed;\">\n<div style=\"font-size:28px;font-weight:700;color:#004a59;\">8 CVEs<\/div>\n<div style=\"font-size:12px;color:#444;margin-top:4px;\">in the KEV update of April 20, 2026<\/div>\n<\/p><\/div>\n<div style=\"flex:1;min-width:200px;text-align:center;background:#f0f9fa;border-radius:8px;padding:20px 12px;border-top:3px solid #69d8ed;\">\n<div style=\"font-size:28px;font-weight:700;color:#004a59;\">April 23<\/div>\n<div style=\"font-size:12px;color:#444;margin-top:4px;\">Deadline for Cisco Catalyst and Synacor Zimbra<\/div>\n<\/p><\/div>\n<div style=\"flex:1;min-width:200px;text-align:center;background:#f0f9fa;border-radius:8px;padding:20px 12px;border-top:3px solid #69d8ed;\">\n<div style=\"font-size:28px;font-weight:700;color:#004a59;\">May 4<\/div>\n<div style=\"font-size:12px;color:#444;margin-top:4px;\">Deadline for the remaining five vulnerabilities<\/div>\n<\/p><\/div>\n<\/div>\n<h2>Why This Update Matters for DACH Security Teams<\/h2>\n<p>Three observations shape this assessment. The first is the composition of the vendor mix. Cisco Catalyst SD-WAN Manager is actively deployed in many DACH corporations, particularly in cross-location networks with distributed office infrastructure. Zimbra Collaboration Suite operates in numerous university and government agency structures. PaperCut is found in nearly every medium-sized printing environment. Organizations using any of these systems should immediately check if the mentioned versions are affected.<\/p>\n<p>The second observation is the connection to BSI advisories. The BSI (Federal Office for Information Security) has published several advance warnings regarding Cisco Catalyst topics in recent weeks, however without hard patch deadlines. CISOs in banks, insurance companies, and operators of KRITIS (critical infrastructure) facilities are increasingly using CISA deadlines as an internal prioritization proxy. Organizations that incorporate the CISA deadline as a forcing function for comparably exposed stacks in their internal escalation logic gain speed without excessive regulation.<\/p>\n<p>The third observation is the lifecycle mix. The update combines a 2023 bug (PaperCut), a 2024 one (JetBrains), two 2025 ones (Kentico, Quest, Synacor), and three 2026 ones (Cisco). This is the reality of modern CVE worlds: Reactivizations occur because unpatched installations remain widespread. <a href=\"https:\/\/www.securitytoday.de\/en\/2026\/04\/23\/papercut-ng-mf-under-active-attack-why-a-2023-bug-re-enters\/\">The PaperCut case<\/a> is exemplary. Organizations that don&#8217;t systematically establish SBOM discipline and patch routines fall behind every wave.<\/p>\n<div class=\"evm-pros-cons\" style=\"display:flex;gap:16px;margin:32px 0;flex-wrap:wrap;\">\n<div style=\"flex:1;min-width:260px;background:#f0f9fa;border-left:4px solid #69d8ed;padding:20px 24px;border-radius:0 8px 8px 0;\">\n<h3 style=\"margin-top:0;font-size:1em;color:#004a59;\">What Security Teams Should Do in the Next 14 Days<\/h3>\n<ul style=\"padding-left:20px;margin:0;color:#444;line-height:1.7;\">\n<li>Inventory: Which of the eight vendor stacks are running in-house, and in which versions?<\/li>\n<li>Prioritize based on exposure (internally vs. externally accessible) and business criticality<\/li>\n<li>Patch rollout for Cisco Catalyst SD-WAN and Synacor Zimbra with highest urgency<\/li>\n<li>Enable detection rules for the KEV vulnerabilities in SIEM and EDR systems<\/li>\n<\/ul><\/div>\n<div style=\"flex:1;min-width:260px;background:#fafafa;border-left:4px solid #888;padding:20px 24px;border-radius:0 8px 8px 0;\">\n<h3 style=\"margin-top:0;font-size:1em;color:#444;\">What Doesn&#8217;t Work<\/h3>\n<ul style=\"padding-left:20px;margin:0;color:#444;line-height:1.7;\">\n<li>Treating patches as purely an IT task without compliance oversight<\/li>\n<li>Relying on &#8220;we&#8217;re not in the US, so we&#8217;re not affected&#8221;<\/li>\n<li>Patches without audit trail and documentation for internal review<\/li>\n<li>Relying on BSI advisories without your own KEV monitoring<\/li>\n<\/ul><\/div>\n<\/div>\n<h2>A 14-Day Response Plan for DACH Security Operations<\/h2>\n<p>Two weeks are sufficient for a clean response when inventory, patch discipline, and detection layers work closely together. The following milestones have been consolidated from conversations with security operations leaders in mid-sized banks and industrial corporations.<\/p>\n<div class=\"evm-timeline\" style=\"margin:32px 0;\">\n<div style=\"display:flex;gap:16px;margin-bottom:16px;padding:16px;border-left:3px solid #69d8ed;background:#f0f9fa;\">\n<div style=\"font-weight:700;color:#004a59;min-width:100px;\">Day 1-2<\/div>\n<div style=\"line-height:1.7;\">Inventory. Which of the eight vendor stacks are running in-house? SBOM evaluation, asset database scan, consultation with technical administrators. Result: Mapping per vendor with version number.<\/div>\n<\/p><\/div>\n<div style=\"display:flex;gap:16px;margin-bottom:16px;padding:16px;border-left:3px solid #69d8ed;background:#f0f9fa;\">\n<div style=\"font-weight:700;color:#004a59;min-width:100px;\">Day 3<\/div>\n<div style=\"line-height:1.7;\">Triage. Prioritization by risk classes. Cisco Catalyst and Synacor Zimbra at the top due to the April 23 deadline. PaperCut and JetBrains in the second wave.<\/div>\n<\/p><\/div>\n<div style=\"display:flex;gap:16px;margin-bottom:16px;padding:16px;border-left:3px solid #69d8ed;background:#f0f9fa;\">\n<div style=\"font-weight:700;color:#004a59;min-width:100px;\">Day 4-7<\/div>\n<div style=\"line-height:1.7;\">Patch rollout of critical stacks. Patching Cisco Catalyst SD-WAN Manager, Synacor Zimbra. Test validation in staging, then productive rollout with audit trail.<\/div>\n<\/p><\/div>\n<div style=\"display:flex;gap:16px;margin-bottom:16px;padding:16px;border-left:3px solid #69d8ed;background:#f0f9fa;\">\n<div style=\"font-weight:700;color:#004a59;min-width:100px;\">Day 8-11<\/div>\n<div style=\"line-height:1.7;\">Patch rollout of second wave. Patching PaperCut, JetBrains, Kentico, Quest KACE. Activate detection rules in SIEM.<\/div>\n<\/p><\/div>\n<div style=\"display:flex;gap:16px;margin-bottom:0;padding:16px;border-left:3px solid #69d8ed;background:#f0f9fa;\">\n<div style=\"font-weight:700;color:#004a59;min-width:100px;\">Day 12-14<\/div>\n<div style=\"line-height:1.7;\">Forensic review and reporting. Check logs from the last 30 days for anomalies. Status report to CISO, Compliance, and potentially regulatory authorities.<\/div>\n<\/p><\/div>\n<\/div>\n<h2>What 2026 Structurally Learns from the KEV Waves<\/h2>\n<p>Three lessons beyond the individual updates deserve attention. First: The KEV (Known Exploited Vulnerabilities) cadence is intensifying. CISA (Cybersecurity and Infrastructure Security Agency) is publishing updates more frequently with more vulnerabilities per update than in 2024. Security teams need a weekly routine slot for KEV assessment, not ad-hoc processing. Those who don&#8217;t do this systematically will be overwhelmed in the next quarter.<\/p>\n<p>Second: SBOM (Software Bill of Materials) investments pay off measurably. Those who don&#8217;t have a complete software bill of materials for their applications cannot react to KEV updates within hours. Providers like Anchore, Snyk and Sysdig offer mature tools in 2026 that automate SBOM generation and KEV matching. The investment typically lies in the low to mid five-digit range per year and pays off with the first serious incident.<\/p>\n<p>Third: Vendor consolidation is also a security lever. Those who operate three print server solutions, four SD-WAN (Software-Defined Wide Area Network) providers and two email platforms in parallel have a patch complexity that creates friction in every KEV wave. A conscious consolidation reduces not only license costs but also patch effort. This discussion belongs in the next IT strategy meeting, not in the security routine.<\/p>\n<p>For CISOs and supervisory boards, the update results in a concrete action logic. The KEV line should be built into every quarterly reporting to the board in 2026. Number of open KEV vulnerabilities, time-to-patch compared to the CISA deadline, and compliance status per regulated industry are three robust KPIs. <a href=\"https:\/\/www.securitytoday.de\/en\/2026\/04\/23\/asp-net-core-cve-2026-40372-cvss-9-1-compliance-implications\/\">The ASP.NET Core discussion regarding DORA and NIS2<\/a> has exemplarily shown how closely the connection between individual CVEs (Common Vulnerabilities and Exposures) and regulatory reporting obligations has become. Those who translate the KEV movement into their own board briefing create clarity at the management level.<\/p>\n<h2 style=\"padding-top:48px;\">Frequently Asked Questions<\/h2>\n<h3>Which eight vulnerabilities are specifically included in the April 20 update?<\/h3>\n<p>Three Cisco Catalyst SD-WAN Manager CVEs (2026-20122, -20128, -20133), PaperCut NG\/MF CVE-2023-27351, JetBrains TeamCity CVE-2024-27199, Kentico Xperience CVE-2025-2749, Quest KACE SMA CVE-2025-32975 and Synacor Zimbra CVE-2025-48700. The Cisco and Synacor vulnerabilities have the April 23 deadline, while the others have the May 4 deadline.<\/p>\n<h3>Are CISA deadlines also binding for German companies?<\/h3>\n<p>Not directly. CISA deadlines are mandatory for US federal agencies in the Federal Civilian Executive Branch. For German companies, they are a recommendation with high reference value. NIS2 (Network and Information Systems Directive 2) operators, KRITIS (critical infrastructure) operators and DORA (Digital Operational Resilience Act)-regulated entities increasingly use them as internal escalation proxies.<\/p>\n<h3>What distinguishes the KEV catalog from the BSI advisory system?<\/h3>\n<p>The KEV catalog exclusively documents vulnerabilities with active exploitation and sets hard patch deadlines for US federal agencies. The BSI (Federal Office for Information Security) publishes advisories with broader risk assessment, without mandatory patch deadlines for the private sector. Both systems complement each other, with the KEV catalog being operationally sharper.<\/p>\n<h3>How often should a security team check for KEV updates?<\/h3>\n<p>At least weekly, ideally with automated notification via RSS or API. For critical updates like the one from April 20, an escalation routine that transfers the update to internal triage within 24 hours is worthwhile.<\/p>\n<h3>Which tools are suitable for KEV monitoring?<\/h3>\n<p>Classic vulnerability management tools like Tenable, Qualys and Rapid7 natively integrate KEV matching. Open-source alternatives like OpenVAS and Wazuh have KEV modules available. Those working with SBOM-based systems use Anchore, Snyk or Grype. The selection depends on the existing tool landscape.<\/p>\n<h3>What does this wave of vulnerabilities mean for mid-sized company security operations?<\/h3>\n<p>Mid-sized companies without 24&#215;7 SOCs have a harder time cleanly addressing all eight vulnerabilities within 14 days. Prioritization based on exposure and business criticality is all the more important. Those with a managed security partner should explicitly coordinate the response path with them.<\/p>\n<div class=\"evm-styled-box\" style=\"background:#f0f9fa;padding:20px 24px;margin:24px 0;border-top:3px solid #69d8ed;\">\n<h2 style=\"margin-top:0;margin-bottom:12px;font-size:1.05em;\">Editor&#8217;s Reading Recommendations<\/h2>\n<p style=\"margin:0 0 8px;\"><a href=\"https:\/\/www.securitytoday.de\/en\/2026\/04\/23\/papercut-ng-mf-under-active-attack-why-a-2023-bug-re-enters\/\">PaperCut NG\/MF: 2023 Bug Back in CISA-KEV<\/a><\/p>\n<p style=\"margin:0 0 8px;\"><a href=\"https:\/\/www.securitytoday.de\/en\/2026\/04\/23\/asp-net-core-cve-2026-40372-cvss-9-1-compliance-implications\/\">ASP.NET Core CVE-2026-40372: DORA and NIS2 Compliance<\/a><\/p>\n<p style=\"margin:0;\"><a href=\"https:\/\/www.securitytoday.de\/en\/2026\/04\/23\/cisco-catalyst-sd-wan-manager-three-cves-under-fire-cisa\/\">Cisco Catalyst SD-WAN Manager: Three CVEs Under Attack<\/a><\/p>\n<\/div>\n<div class=\"evm-styled-box\" style=\"background:#f8f9fa;padding:20px 24px;margin:24px 0;border-top:3px solid #354037;\">\n<h2 style=\"margin-top:0;margin-bottom:12px;font-size:1.05em;\">More from the MBF Media Network<\/h2>\n<p style=\"margin:0 0 8px;\"><a href=\"https:\/\/www.cloudmagazin.com\/en\/2026\/04\/24\/saas-sprawl-audit-mittelstand-2026-90-tage-finops-procurement\/\">Cloudmagazin: SaaS Sprawl Audit in the SME Sector 2026<\/a><\/p>\n<p style=\"margin:0 0 8px;\"><a href=\"https:\/\/mybusinessfuture.com\/fortune-it-services-6000-milliarden-cognizant-outcome-mittelstand-2026\/\">MyBusinessFuture: Fortune Report April 22 and IT Services Outcome Models<\/a><\/p>\n<p style=\"margin:0;\"><a href=\"https:\/\/www.digital-chiefs.de\/cio-welle-april-2026-mike-kelly-autodesk-brian-rice-albertsons-hybride-profile\/\">Digital Chiefs: CIO Wave April 2026 with hybrid tech profiles<\/a><\/p>\n<\/div>\n<p style=\"text-align:right;font-style:italic;color:#888;font-size:0.85em;margin-top:24px;\">Source cover image: Pexels \/ Erik Mclean (px:6016937)<\/p>\n","protected":false},"excerpt":{"rendered":"CISA KEV Update from April 20, 2026 with eight vulnerabilities, patch deadlines on April 23 and May 4. 14-day response plan for DACH security teams.","protected":false},"author":50,"featured_media":12896,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"CISA KEV Update from April 20, 2026: Eight vulnerabilities (Cisco, PaperCut, Zimbra, JetBrains), deadlines 04\/23 and 05\/04, 14-day response plan.","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_meta-robots-adv":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_twitter-image-id":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-12993","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktuelles"],"wpml_language":"en","wpml_translation_of":12897,"_links":{"self":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/12993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/comments?post=12993"}],"version-history":[{"count":2,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/12993\/revisions"}],"predecessor-version":[{"id":13184,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/12993\/revisions\/13184"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media\/12896"}],"wp:attachment":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media?parent=12993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/categories?post=12993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/tags?post=12993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}