--===============7670724143704314155==
Content-Type: multipart/alternative; boundary="===============3107246963724018957=="
MIME-Version: 1.0
--===============3107246963724018957==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Cybersecurity and Infrastructure Security Agency (CISA)
You are subscribed to Cybersecurity Advisories for Cybersecurity and Infras= tructure Security Agency. This information has recently been updated and is=
now available.
CISA Adds Six Known Exploited Vulnerabilities to Catalog [
https://www.cisa= .gov/news-events/alerts/2026/02/10/cisa-adds-six-known-exploited-vulnerabil= ities-catalog ] 02/10/2026 04:00 PM EST=20
CISA has added six new vulnerabilities to its Known Exploited Vulnerabiliti=
es (KEV) Catalog [
https://www.cisa.gov/known-exploited-vulnerabilities-cat= alog ], based on evidence of active exploitation.=C2=A0
* CVE-2026-21510 [
https://www.cve.org/CVERecord?id=3DCVE-2026-21510 ] Mi= crosoft Windows Shell Protection Mechanism Failure Vulnerability=20
* CVE-2026-21513 [
https://www.cve.org/CVERecord?id=3DCVE-2026-21513 ] Mi= crosoft MSHTML Framework Security Feature Bypass Vulnerability=20
* CVE-2026-21514 [
https://www.cve.org/CVERecord?id=3DCVE-2026-21514 ] Mi= crosoft Office Word Reliance on Untrusted Inputs in a Security Decision Vul= nerability=20
* CVE-2026-21519 [
https://www.cve.org/CVERecord?id=3DCVE-2026-21519 ] Mi= crosoft Windows Type Confusion Vulnerability=20
* CVE-2026-21525 [
https://www.cve.org/CVERecord?id=3DCVE-2026-21525 ] Mi= crosoft Windows NULL Pointer Dereference Vulnerability=20
* CVE-2026-21533 [
https://www.cve.org/CVERecord?id=3DCVE-2026-21533 ] Wi= ndows Remote Desktop Services Elevation of Privilege Vulnerability=C2=A0=20
These types of vulnerabilities are frequent attack vectors for malicious cy= ber actors and pose significant risks to the federal enterprise.=C2=A0
_Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk o=
f Known Exploited Vulnerabilities_ [
https://www.cisa.gov/binding-operation= al-directive-22-01 ] established the KEV Catalog as a living list of known = Common Vulnerabilities and Exposures (CVEs) that carry significant risk to = the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branc=
h (FCEB) agencies to remediate identified vulnerabilities by the due date t=
o protect FCEB networks against active threats. See the _BOD 22-01 Fact She= et_ [
https://www.cisa.gov/sites/default/files/publications/Reducing_the_Si= gnificant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf ] for more inf= ormation.=C2=A0
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all o= rganizations to reduce their exposure to cyberattacks by prioritizing timel=
y remediation of _KEV Catalog vulnerabilities_ [
https://www.cisa.gov/known= -exploited-vulnerabilities-catalog ] as part of their vulnerability managem= ent practice. CISA will continue to add vulnerabilities to the catalog that=
meet the _specified criteria_ [
https://www.cisa.gov/known-exploited-vulne= rabilities ].=C2=A0
This product is provided subject to this=C2=A0Notification [
https://www.ci= sa.gov/notification ]=C2=A0and this=C2=A0Privacy & Use [
https://www.cisa.g= ov/privacy-policy ]=C2=A0policy.
body { font-size: 1em; font-family: Arial, Verdana, sans-serif; font-weight=
: normal; font-style: normal; color: #333333; }=20
Having trouble viewing this message?=C2=A0View it as a webpage [
https://co= ntent.govdelivery.com/accounts/USDHSCISA/bulletins/4093c1e ].=C2=A0 [ https= ://content.govdelivery.com/accounts/USDHS/bulletins/292141e ]
You are subscribed to updates from the Cybersecurity and Infrastructure Sec= urity Agency [
https://www.cisa.gov ] (CISA)
Manage Subscriptions [
https://public.govdelivery.com/accounts/USDHSCISA/su= bscriber/edit?preferences=3Dtrue#tab1 ]=C2=A0=C2=A0|=C2=A0=C2=A0Privacy Pol= icy [
https://www.cisa.gov/privacy-policy ]=C2=A0=C2=A0|=C2=A0 Help [ https= ://subscriberhelp.granicus.com/s/article/Subscriber-Help-Center ] [ https:/= /insights.govdelivery.com/Communications/Subscriber_Help_Center ]
Connect with CISA:=20
Facebook [
https://www.facebook.com/CISA ]=C2=A0 |=C2=A0 Twitter [
https://= twitter.com/CISAgov ]=C2=A0 |=C2=A0 Instagram [
https://Instagram.com/cisag=
ov ]=C2=A0 |=C2=A0 LinkedIn [
https://www.linkedin.com/company/cybersecurit= y-and-infrastructure-security-agency ]=C2=A0 |=C2=A0=C2=A0 YouTube [ https:= //www.youtube.com/channel/UCxyq9roe-npgzrVwbpoAy0A ]
________________________________________________________________________
This email was sent to
cisa@toolazy.synchro.net using GovDelivery Communica= tions Cloud, on behalf of: Cybersecurity and Infrastructure Security Agency=
=C2=B7 707 17th St, Suite 4000 =C2=B7 Denver, CO 80202 GovDelivery logo [ =
https://subscriberhelp.granicus.com/ ]=20
body .abe-column-block { min-height: 5px; } table.gd_combo_table img {margi= n-left:10px; margin-right:10px;} table.gd_combo_table div.govd_image_displa=
y img, table.gd_combo_table td.gd_combo_image_cell img {margin-left:0px; ma= rgin-right:0px;}
--===============3107246963724018957==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns=3D"
http://www.w3.org/1999/xhtml" xml:lang=3D"en" lang=3D"en"> <head>
<title> CISA Adds Six Known Exploited Vulnerabilities to Catalog
</title>
</head>
<body style=3D"">
<table width=3D"700" border=3D"0" cellspacing=3D"0" cellpadding=3D"0"=
align=3D"center">
<tr>
<td>
<!--[if (gte mso 9)|(IE)]>
<table style=3D"display:none"><tr><td><a name=3D"gd_top" id=3D"gd_top"></= a></td></tr></table>
<![endif]-->
<a name=3D"gd_top" id=3D"gd_top"></a>
=20
<p><img src=3D"
https://content.govdelivery.com/attachments/fancy_images/U= SDHSCISA/2020/06/3486054/05152023-gov-delivery-banner-copy_original.png" al= t=3D"Cybersecurity and Infrastructure Security Agency (CISA)" title=3D"" wi= dth=3D"600" height=3D"100"></p>
<p>You are subscribed to Cybersecurity Advisories for Cybersecurity and I= nfrastructure Security Agency. This information has recently been updated a=
nd is now available.</p>
<div class=3D"rss_item" style=3D"margin-bottom: 2em;">
<div class=3D"rss_title" style=3D"font-weight: bold; font-size: 120%; margi=
n: 0 0 0.3em; padding: 0;"><a href=3D"
https://www.cisa.gov/news-events/aler= ts/2026/02/10/cisa-adds-six-known-exploited-vulnerabilities-catalog" target= =3D"_blank" title=3D"CISA Adds Six Known Exploited Vulnerabilities to Catal= og" rel=3D"noopener">CISA Adds Six Known Exploited Vulnerabilities to Catal= og</a></div>
<div class=3D"rss_pub_date" style=3D"font-size: 90%; font-style: italic; co= lor: #666666; margin: 0 0 0.3em; padding: 0;">02/10/2026 04:00 PM EST</div> <div class=3D"rss_description" style=3D"margin: 0 0 0.3em; padding: 0;">
<div class=3D"OutlineElement Ltr SCXW169298289 BCX8">
<p>CISA has added six new vulnerabilities to its <a href=3D"
https://www.cis= a.gov/known-exploited-vulnerabilities-catalog" target=3D"_blank" title=3D"K= nown Exploited Vulnerabilities (KEV) Catalog" rel=3D"noopener">Known Exploi= ted Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploita= tion.=C2=A0</p>
<a href=3D"
https://www.cve.org/CVERecord?id=3DCVE-2026-21510" target=3D"_bl= ank" title=3D"CVE-2026-21510" rel=3D"noopener">CVE-2026-21510</a> Microsoft=
Windows Shell Protection Mechanism Failure Vulnerability</li>
<a href=3D"
https://www.cve.org/CVERecord?id=3DCVE-2026-21513" target=3D"_bl= ank" title=3D"CVE-2026-21513" rel=3D"noopener">CVE-2026-21513</a> Microsoft=
MSHTML Framework Security Feature Bypass Vulnerability</li>
<a href=3D"
https://www.cve.org/CVERecord?id=3DCVE-2026-21514" target=3D"_bl= ank" title=3D"CVE-2026-21514" rel=3D"noopener">CVE-2026-21514</a> Microsoft=
Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerabil= ity</li>
<a href=3D"
https://www.cve.org/CVERecord?id=3DCVE-2026-21519" target=3D"_bl= ank" title=3D"CVE-2026-21519" rel=3D"noopener">CVE-2026-21519</a> Microsoft=
Windows Type Confusion Vulnerability</li>
<a href=3D"
https://www.cve.org/CVERecord?id=3DCVE-2026-21525" target=3D"_bl= ank" title=3D"CVE-2026-21525" rel=3D"noopener">CVE-2026-21525</a> Microsoft=
Windows NULL Pointer Dereference Vulnerability</li>
<a href=3D"
https://www.cve.org/CVERecord?id=3DCVE-2026-21533" target=3D"_bl= ank" title=3D"CVE-2026-21533" rel=3D"noopener">CVE-2026-21533</a> Windows R= emote Desktop Services Elevation of Privilege Vulnerability=C2=A0</li>
</ul>
<p>These types of vulnerabilities are frequent attack vectors for malicious=
cyber actors and pose significant risks to the federal enterprise.=C2=A0</=
</div>
<div class=3D"OutlineElement Ltr SCXW169298289 BCX8">
<p><a href=3D"
https://www.cisa.gov/binding-operational-directive-22-01"><u>= Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of=
Known Exploited Vulnerabilities</u></a> established the KEV Catalog as a l= iving list of known Common Vulnerabilities and Exposures (CVEs) that carry = significant risk to the federal enterprise. BOD 22-01 requires Federal Civi= lian Executive Branch (FCEB) agencies to remediate identified vulnerabiliti=
es by the due date to protect FCEB networks against active threats. See the=
<a href=3D"
https://www.cisa.gov/sites/default/files/publications/Reducing_= the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf"><u>BOD = 22-01 Fact Sheet</u></a> for more information.=C2=A0</p>
</div>
<div class=3D"OutlineElement Ltr SCXW169298289 BCX8">
<p>Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges al=
l organizations to reduce their exposure to cyberattacks by prioritizing ti= mely remediation of <a href=3D"
https://www.cisa.gov/known-exploited-vulnera= bilities-catalog"><u>KEV Catalog vulnerabilities</u></a> as part of their v= ulnerability management practice. CISA will continue to add vulnerabilities=
to the catalog that meet the <a href=3D"
https://www.cisa.gov/known-exploit= ed-vulnerabilities"><u>specified criteria</u></a>.=C2=A0</p>
<p><span>This product is provided subject to this=C2=A0</span><a href=3D"ht= tps://www.cisa.gov/notification" target=3D"_blank" title=3D"Notification" r= el=3D"noopener">Notification</a><span>=C2=A0and this=C2=A0</span><a href=3D= "
https://www.cisa.gov/privacy-policy" target=3D"_blank" title=3D"Privacy &a= mp; Use" rel=3D"noopener">Privacy & Use</a><span>=C2=A0policy.</span></=
</div>
</div>
</div>
<style>body {
font-size: 1em; font-family: Arial, Verdana, sans-serif; font-weight: norma=
l; font-style: normal; color: #333333;
}
</style>
=20
<div id=3D"mail_footer">
<p style=3D"text-align: center;"><span style=3D"font-size: 10.0pt; colo=
r: #757575;">Having trouble viewing this message?=C2=A0</span><a href=3D"ht= tps://content.govdelivery.com/accounts/USDHSCISA/bulletins/4093c1e" target= =3D"_blank" rel=3D"noopener">View it as a webpage</a>.=C2=A0<a href=3D"http= s://content.govdelivery.com/accounts/USDHS/bulletins/292141e" target=3D"_bl= ank" rel=3D"noopener"></a><span style=3D"font-size: 10.0pt; color: #757575;= "></span></p>
<p style=3D"text-align: center;"><span style=3D"font-size: 10.0pt; color: #= 757575;">You are subscribed to updates from the </span><a href=3D"
https://w= ww.cisa.gov"><span style=3D"font-size: 10.0pt;">Cybersecurity and Infrastru= cture Security Agency</span></a><span style=3D"font-size: 10.0pt; color: #7= 57575;"> (CISA)<br></span><a href=3D"
https://public.govdelivery.com/account= s/USDHSCISA/subscriber/edit?preferences=3Dtrue#tab1" target=3D"_blank" rel= =3D"noopener"><span style=3D"font-size: 10.0pt; color: #00568c;">Manage Sub= scriptions</span></a>=C2=A0=C2=A0<span style=3D"font-size: 10.0pt; color: #= 757575;">|=C2=A0=C2=A0</span><a href=3D"
https://www.cisa.gov/privacy-policy=
" target=3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; colo=
r: #00568c;">Privacy Policy</span></a><span style=3D"font-size: 10.0pt; col= or: #757575;">=C2=A0=C2=A0|=C2=A0 <a href=3D"
https://subscriberhelp.granicu= s.com/s/article/Subscriber-Help-Center" target=3D"_blank" rel=3D"noopener">= Help</a><a href=3D"
https://insights.govdelivery.com/Communications/Subscrib= er_Help_Center" target=3D"_blank" rel=3D"noopener"></a></span><span style= =3D"font-size: 10.0pt; color: #757575;"></span></p>
<p style=3D"text-align: center;"><span style=3D"font-size: 10.0pt; color: #= 757575;">Connect with CISA: <br></span><a href=3D"
https://www.facebook.com/= CISA" target=3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; = color: #00568c;">Facebook</span></a><span style=3D"font-size: 10.0pt; color=
: #757575;">=C2=A0 |=C2=A0 </span><a href=3D"
https://twitter.com/CISAgov" t= arget=3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; color: = #00568c;">Twitter</span></a><span style=3D"font-size: 10.0pt; color: #75757= 5;">=C2=A0 |=C2=A0 </span><a href=3D"
https://Instagram.com/cisagov" target= =3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; color: #0056= 8c;">Instagram</span></a><span style=3D"font-size: 10.0pt; color: #757575;"= >=C2=A0 |=C2=A0 </span><a href=3D"
https://www.linkedin.com/company/cybersec= urity-and-infrastructure-security-agency" target=3D"_blank" rel=3D"noopener= "><span style=3D"font-size: 10.0pt; color: #00568c;">LinkedIn</span></a><sp=
an style=3D"font-size: 10.0pt; color: #757575;">=C2=A0 |=C2=A0=C2=A0 </span= ><a href=3D"
https://www.youtube.com/channel/UCxyq9roe-npgzrVwbpoAy0A" targe= t=3D"_self"><span style=3D"font-size: 10.0pt; color: #00568c;">YouTube</spa= n></a><span style=3D"font-size: 10.0pt; color: #757575;"></span></p>
</div>
<div id=3D"tagline">
<hr>
<table style=3D"width: 100%;" border=3D"0" cellspacing=3D"0" cellpadding=3D=
<tbody>
<td style=3D"color: #757575; font-size: 10px; font-family: Arial;" width=3D= "89%">This email was sent to
cisa@toolazy.synchro.net using GovDelivery Com= munications Cloud, on behalf of: Cybersecurity and Infrastructure Security = Agency =C2=B7 707 17th St, Suite 4000 =C2=B7 Denver, CO 80202</td>
<td align=3D"right" width=3D"11%"><a href=3D"
https://subscriberhelp.granicu= s.com/" target=3D"_blank" rel=3D"noopener"><img src=3D"
https://content.govd= elivery.com/images/govd-logo-dark.png" border=3D"0" alt=3D"GovDelivery logo=
" width=3D"115"></a></td>
</tr>
</tbody>
</table>
<style type=3D"text/css">body .abe-column-block { min-height: 5px; } table.= gd_combo_table img {margin-left:10px; margin-right:10px;} table.gd_combo_ta= ble div.govd_image_display img, table.gd_combo_table td.gd_combo_image_cell=
img {margin-left:0px; margin-right:0px;}</style>
</div>
</td>
</tr>
</table>
<img alt=3D"" src=3D"
https://links-2.govdelivery.com/CI0/0101019c4961ecdd-0= 97ba77c-5493-4d64-bb7a-3e7219441158-000000/u9Sgvsk5-W75YSxYAMT5Kx8u67-lHtQW= Orqo_3MZwRw=3D444" style=3D"display: none; width: 1px; height: 1px;">
</body>
</html>
--===============3107246963724018957==--
--===============7670724143704314155==--