Article Details

Scrape Timestamp (UTC): 2026-01-23 15:24:27.289

Source: https://thehackernews.com/2026/01/cisa-updates-kev-catalog-with-four.html

Original Article Text

Click to Toggle View

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - It's worth noting that CVE-2025-54313 refers to a supply chain attack targeting eslint-config-prettier and six other npm packages, eslint-plugin-prettier, synckit, @pkgr/core, napi-postinstall, got-fetch, and is, that came to light in July 2025. The phishing campaign targeted the package maintainers with bogus links that harvested their credentials under the pretext of verifying their email address as part of regular account maintenance, allowing the threat actors to publish trojanized versions. According to CrowdSec, exploitation efforts targeting CVE-2025-68645 have been ongoing since January 14, 2026. There are currently no details on how the other vulnerabilities are being exploited in the wild. Pursuant to Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary fixes by February 12, 2026, to secure their networks against active threats.

Daily Brief Summary

VULNERABILITIES // CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities catalog with four new security flaws, signaling active exploitation in the wild.

Among the vulnerabilities, CVE-2025-54313 is linked to a supply chain attack involving eslint-config-prettier and several npm packages, discovered in July 2025.

Attackers used phishing tactics to compromise package maintainers' credentials, enabling the release of trojanized versions of npm packages.

CVE-2025-68645 has been actively targeted since January 14, 2026, though specific exploitation details for other vulnerabilities remain undisclosed.

Federal Civilian Executive Branch agencies must implement necessary security patches by February 12, 2026, as mandated by Binding Operational Directive 22-01.

The directive aims to fortify federal networks against these active threats, emphasizing the importance of timely vulnerability management.

Organizations are encouraged to monitor the KEV catalog for updates and ensure prompt application of security measures to mitigate risks.