CISA Flags SolarWinds, Ivanti, and Workspace One
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. Th
What Happened
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urgently added three significant vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, confirming they are under active attack. The flaws impact enterprise products from VMware, Ivanti, and SolarWinds. While specific CVE identifiers for the Ivanti and SolarWinds flaws were not detailed in the initial alert, the VMware vulnerability is tracked as CVE-2021-22054. CISA’s action mandates all U.S. federal civilian agencies to patch these vulnerabilities by a specified deadline, serving as a critical warning for all organizations using these widely deployed IT management and access solutions.
Why It Matters
This KEV update signals a coordinated exploitation campaign targeting the foundational tools used for network and endpoint management. VMware Workspace ONE Access, Ivanti Endpoint Manager, and SolarWinds products like Orion are deeply integrated into enterprise IT environments, often possessing high privileges and broad network access. Successful exploitation provides attackers with a powerful foothold to move laterally, deploy ransomware, or conduct espionage. The fact that these distinct vulnerabilities from different vendors are being exploited simultaneously suggests threat actors are actively scanning for and attacking unpatched systems, making delayed remediation a high-stakes risk.
Technical Details
The confirmed VMware flaw, CVE-2021-22054, is a critical file upload vulnerability in the VMware Workspace ONE Access and Identity Manager. It allows an unauthenticated attacker to upload arbitrary files, leading to remote code execution. While the exact CVEs for the Ivanti and SolarWinds vulnerabilities were not released in this specific alert, historical context indicates they likely involve high-severity flaws in Ivanti Endpoint Manager (formerly LANDesk) and SolarWinds service desk or monitoring platforms that have been previously disclosed. The common attack vector across these systems is internet-facing administrative interfaces, which are prime targets for initial access brokers and ransomware affiliates.
Immediate Risk
The risk is critical and immediate. CISA’s KEV designation is based on verified evidence of in-the-wild exploitation. Any organization using affected versions of VMware Workspace ONE Access, Ivanti Endpoint Manager, or vulnerable SolarWinds products that are exposed to the internet or accessible from compromised networks is at direct risk of breach. The urgency is highest for federal agencies bound by the directive, but private sector entities are equally vulnerable. Attackers are likely leveraging automated tools to find and exploit these weaknesses, meaning the window for patching is extremely short.
Security Insight
This event underscores a persistent threat pattern: attackers relentlessly target widely used enterprise management software. Security teams must prioritize asset discovery and patch management for these often-overlooked “behind-the-scenes” systems that hold the keys to the network. Immediate action should include: auditing for the use of these specific products, verifying patch levels against the latest vendor advisories, and isolating management interfaces from the public internet if possible. Treating CISA’s KEV catalog as a prioritized remediation list is a highly effective strategy for mitigating known, active threats.
Never miss a security update
Get real-time security alerts delivered to your preferred platform.
Related News
Ivanti warned customers today to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) exploited in zero-day attacks. [...]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its Known Exploited Vulnerabilities catalog, flagging the
Palo Alto Networks warned customers today that a critical-severity unpatched vulnerability in the PAN-OS User-ID Authentication Portal is being exploited in attacks. [...]