Critical Vulnerability

CISA Flags SolarWinds, Ivanti, and Workspace One

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. Th

What Happened

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urgently added three significant vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, confirming they are under active attack. The flaws impact enterprise products from VMware, Ivanti, and SolarWinds. While specific CVE identifiers for the Ivanti and SolarWinds flaws were not detailed in the initial alert, the VMware vulnerability is tracked as CVE-2021-22054. CISA’s action mandates all U.S. federal civilian agencies to patch these vulnerabilities by a specified deadline, serving as a critical warning for all organizations using these widely deployed IT management and access solutions.

Why It Matters

This KEV update signals a coordinated exploitation campaign targeting the foundational tools used for network and endpoint management. VMware Workspace ONE Access, Ivanti Endpoint Manager, and SolarWinds products like Orion are deeply integrated into enterprise IT environments, often possessing high privileges and broad network access. Successful exploitation provides attackers with a powerful foothold to move laterally, deploy ransomware, or conduct espionage. The fact that these distinct vulnerabilities from different vendors are being exploited simultaneously suggests threat actors are actively scanning for and attacking unpatched systems, making delayed remediation a high-stakes risk.

Technical Details

The confirmed VMware flaw, CVE-2021-22054, is a critical file upload vulnerability in the VMware Workspace ONE Access and Identity Manager. It allows an unauthenticated attacker to upload arbitrary files, leading to remote code execution. While the exact CVEs for the Ivanti and SolarWinds vulnerabilities were not released in this specific alert, historical context indicates they likely involve high-severity flaws in Ivanti Endpoint Manager (formerly LANDesk) and SolarWinds service desk or monitoring platforms that have been previously disclosed. The common attack vector across these systems is internet-facing administrative interfaces, which are prime targets for initial access brokers and ransomware affiliates.

Immediate Risk

The risk is critical and immediate. CISA’s KEV designation is based on verified evidence of in-the-wild exploitation. Any organization using affected versions of VMware Workspace ONE Access, Ivanti Endpoint Manager, or vulnerable SolarWinds products that are exposed to the internet or accessible from compromised networks is at direct risk of breach. The urgency is highest for federal agencies bound by the directive, but private sector entities are equally vulnerable. Attackers are likely leveraging automated tools to find and exploit these weaknesses, meaning the window for patching is extremely short.

Security Insight

This event underscores a persistent threat pattern: attackers relentlessly target widely used enterprise management software. Security teams must prioritize asset discovery and patch management for these often-overlooked “behind-the-scenes” systems that hold the keys to the network. Immediate action should include: auditing for the use of these specific products, verifying patch levels against the latest vendor advisories, and isolating management interfaces from the public internet if possible. Treating CISA’s KEV catalog as a prioritized remediation list is a highly effective strategy for mitigating known, active threats.

Share:

Never miss a security update

Get real-time security alerts delivered to your preferred platform.

Related News

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.