--===============8856491512790867670==
Content-Type: multipart/alternative; boundary="===============1731792185678271427=="
MIME-Version: 1.0
--===============1731792185678271427==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Sec= ure Tomorrow
CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco=
SD-WAN Systems [
https://www.cisa.gov/news-events/alerts/2026/02/25/cisa-a= nd-partners-release-guidance-ongoing-global-exploitation-cisco-sd-wan-syste=
ms ]
"02/25/2026 11:00 AM EST"
"The purpose of this Alert is to provide resources for organizations with C= isco Software-Defined Wide-Area Networking (SD-WAN) systems, including Fede= ral Civilian Executive Branch (FCEB) agencies, to address ongoing exploitat= ion of multiple vulnerabilities. Notably, the Cybersecurity and Infrastruct= ure Security Agency (CISA) has added=C2=A0"CVE-2026-20127 [
https://www.cve= .org/CVERecord?id=3DCVE-2026-20127 ]"=C2=A0and=C2=A0"CVE-2022-20775 [ https= ://www.cve.org/CVERecord?id=3DCVE-2022-20775 ]"=C2=A0to its Known Exploited=
Vulnerabilities (KEV) Catalog on Feb. 25, 2026. As a result of the malicio=
us cyber activity and vulnerabilities involving Cisco SD-WAN systems, CISA = has outlined requirements for FCEB agencies in Emergency Directive (ED) 26-=
03 to inventory Cisco SD-WAN systems, update them, and assess compromise."
CISA and partners have observed malicious cyber actors targeting and compro= mising Cisco SD-WAN systems of organizations, globally. These actors have b= een observed exploiting a previously undisclosed authentication bypass vuln= erability, CVE-2026-20127, for initial access before escalating privileges = using CVE-2022-20775 and establishing long-term persistence in Cisco SD-WAN=
systems.
CISA, National Security Agency (NSA), and international partners Australian=
Signals Directorate=E2=80=99s Australian Cyber Security Centre (ASD=E2=80= =99s ACSC), Canadian Centre for Cyber Security (Cyber Centre), New Zealand = National Cyber Security Centre (NCSC-NZ), and United Kingdom National Cyber=
Security Centre (NCSC-UK), hereafter the =E2=80=9Cauthoring organizations,= =E2=80=9D strongly urge network defenders to immediately 1) inventory all i= n-scope Cisco SD-WAN systems, 2) collect artifacts, including virtual snaps= hots and logs off of SD-WAN systems to support threat hunt activities, 3) f= ully patch Cisco SD-WAN systems with available updates, 4) hunt for evidenc=
e of compromise, and 5) concurrently review Cisco=E2=80=99s latest security=
advisories,=C2=A0Cisco Catalyst SD-WAN Controller Authentication Bypass Vu= lnerability [
https://sec.cloudapps.cisco.com/security/center/content/Cisco= SecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk ]=C2=A0and=C2=A0Cisco Catalyst = SD-WAN Vulnerabilities [
https://sec.cloudapps.cisco.com/security/center/co= ntent/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v ], and implement= =C2=A0Cisco=E2=80=99s SD-WAN Hardening Guidance [
https://sec.cloudapps.cis= co.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide ].1 [=
https://www.cisa.gov/news-events/alerts/2026/02/25/cisa-and-partners-relea= se-guidance-ongoing-global-exploitation-cisco-sd-wan-systems#note1 ]
To address malicious activity involving vulnerable Cisco SD-WAN systems, CI=
SA issued=C2=A0Emergency Directive 26-03: Mitigate Vulnerabilities in Cisco=
SD-WAN Systems [
https://www.cisa.gov/news-events/directives/ed-26-03-miti= gate-vulnerabilities-cisco-sd-wan-systems ], which outlines requirements fo=
r FCEB agencies to inventory Cisco SD-WAN systems, update them, and assess = compromise. Further, CISA released=C2=A0Supplemental Emergency Direction 26= -03: Hunt and Hardening Guidance for Cisco SD-WAN Systems [
https://www.cis= a.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-harde= ning-guidance-cisco-sd-wan-systems ]=C2=A0to provide prescriptive actions f=
or FCEB agencies.=C2=A0
Cisco=E2=80=99s Catalyst SD-WAN Hardening Guide recommends that network def= enders address:
* *Network perimeter controls*: Ensure control components are behind a fi= rewall, isolate virtual private network (VPN) 512 interfaces, and use inter= net protocol (IP) blocks for manually provisioned edge IPs.=20
* *SD-WAN manager access*: Replace the self-signed certificate for the we=
b user interface.=20
* *Control and data plane security*: Use pairwise keys.=20
* *Session timeout*: Limit to the shortest period possible.=20
* *Logging*: Forward to a remote syslog server.=20
CISA and the authoring organizations are providing the following resources:= =E2=80=AF=C2=A0
* CISA:=C2=A0Emergency Directive 26-03: Mitigate Vulnerabilities in Cisco=
SD-WAN Systems [
https://www.cisa.gov/news-events/directives/ed-26-03-miti= gate-vulnerabilities-cisco-sd-wan-systems ]=20
* CISA:=C2=A0Supplemental Emergency Direction 26-03: Hunt and Hardening G= uidance for Cisco SD-WAN Systems [
https://www.cisa.gov/news-events/directi= ves/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wa= n-systems ]=20
* Cisco:=C2=A0Cisco Catalyst SD-WAN Controller Authentication Bypass Vuln= erability [
https://sec.cloudapps.cisco.com/security/center/content/CiscoSe= curityAdvisory/cisco-sa-sdwan-rpa-EHchtZk ]=20
* Cisco:=C2=A0Cisco Catalyst SD-WAN Vulnerabilities [
https://sec.cloudap= ps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-a= uthbp-qwCX8D4v ]=20
* Cisco:=C2=A0Cisco Catalyst SD-WAN Hardening Guide [
https://sec.cloudap= ps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide=
]=20
* ASD=E2=80=99s ACSC:=C2=A0Cisco SD-WAN Threat Hunt Guide [
https://www.c= yber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20= Guide.pdf ], co-sealed by CISA, NSA, Cyber Centre, NCSC-NZ, and NCSC-UK. Th=
is guide, based on investigative data, supports network defenders=E2=80=99 = detection of and response to the malicious actors=E2=80=99 threat activity =
*Acknowledgements*
NSA, ASD=E2=80=99s ACSC, Cyber Centre, NCSC-NZ, and NCSC-UK contributed to = this alert*.*
*Disclaimer*
The information in this report is being provided =E2=80=9Cas is=E2=80=9D fo=
r informational purposes only. CISA does not endorse any commercial entity,=
product, company, or service, including any entities, products, or service=
s linked within this document. Any reference to specific commercial entitie=
s, products, processes, or services by service mark, trademark, manufacture=
r, or otherwise, does not constitute or imply endorsement, recommendation, =
or favoring by CISA.=E2=80=AF
*Notes*=C2=A0
1=C2=A0Cisco Security, =E2=80=9CCisco Catalyst SD-WAN Hardening Guide,=E2= =80=9D last modified February 9, 2026,=C2=A0
https://sec.cloudapps.cisco.com= /security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide
This product is provided subject to this=C2=A0Notification [
https://edit.c= isa.gov/notification ]=C2=A0and this=C2=A0Privacy & Use [
https://edit.cisa= .gov/privacy-policy ]=C2=A0policy.
Please share your thoughts with us through this this anonymous survey [ htt= ps://cisasurvey.gov1.qualtrics.com/jfe/form/SV_9n4TtB8uttUPaM6?Source=3DGov= DeliveryED26-03-Alert-Guidance ]. We appreciate your feedback.
Having trouble viewing this message?=C2=A0View it as a webpage [ %20 ].=C2=
=A0 [
https://content.govdelivery.com/accounts/USDHS/bulletins/292141e ]
You are subscribed to updates from the Cybersecurity and Infrastructure Sec= urity Agency [
https://www.cisa.gov ] (CISA)
Manage Subscriptions [
https://public.govdelivery.com/accounts/USDHSCISA/su= bscriber/edit?preferences=3Dtrue#tab1 ]=C2=A0=C2=A0|=C2=A0=C2=A0Privacy Pol= icy [
https://www.cisa.gov/privacy-policy ]=C2=A0=C2=A0|=C2=A0 Help [ https= ://subscriberhelp.granicus.com/s/article/Subscriber-Help-Center ] [ https:/= /insights.govdelivery.com/Communications/Subscriber_Help_Center ]
Connect with CISA:=20
Facebook [
https://www.facebook.com/CISA ]=C2=A0 |=C2=A0 Twitter [
https://= twitter.com/CISAgov ]=C2=A0 |=C2=A0 Instagram [
https://Instagram.com/cisag=
ov ]=C2=A0 |=C2=A0 LinkedIn [
https://www.linkedin.com/company/cybersecurit= y-and-infrastructure-security-agency ]=C2=A0 |=C2=A0=C2=A0 YouTube [ https:= //www.youtube.com/channel/UCxyq9roe-npgzrVwbpoAy0A ]
________________________________________________________________________
This email was sent to
cisa@toolazy.synchro.net using GovDelivery Communica= tions Cloud, on behalf of: Cybersecurity and Infrastructure Security Agency=
=C2=B7 707 17th St, Suite 4000 =C2=B7 Denver, CO 80202 GovDelivery logo [ =
https://subscriberhelp.granicus.com/ ]=20
body .abe-column-block { min-height: 5px; } table.gd_combo_table img {margi= n-left:10px; margin-right:10px;} table.gd_combo_table div.govd_image_displa=
y img, table.gd_combo_table td.gd_combo_image_cell img {margin-left:0px; ma= rgin-right:0px;}
--===============1731792185678271427==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "
http://www.= w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns=3D"
http://www.w3.org/1999/xhtml" xml:lang=3D"en" lang=3D"en"> <head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF-8"> <title> CISA and Partners Release Guidance for Ongoing Global Exploitati=
on of Cisco SD-WAN Systems
</title>
</head>
<body style=3D"">
<table width=3D"700" border=3D"0" cellspacing=3D"0" cellpadding=3D"0"=
align=3D"center">
<tr>
<td>
<!--[if (gte mso 9)|(IE)]>
<table style=3D"display:none"><tr><td><a name=3D"gd_top" id=3D"gd_top"></= a></td></tr></table>
<![endif]-->
<a name=3D"gd_top" id=3D"gd_top"></a>
=20
<p><img src=3D"
https://content.govdelivery.com/attachments/fancy_images/U= SDHSCISA/2020/06/3486054/062920-govdeliveryheader-thin2_original.png" alt= =3D"Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today,=
Secure Tomorrow" title=3D"" width=3D"600" height=3D"100"></p>
<div class=3D"l-page-section l-page-section--rich-text csaf-imported">
<div class=3D"l-constrain">
<div class=3D"l-page-section__content">
<h2><a href=3D"
https://www.cisa.gov/news-events/alerts/2026/02/25/cisa-and-= partners-release-guidance-ongoing-global-exploitation-cisco-sd-wan-systems"= >CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisc=
o SD-WAN Systems</a></h2>
<p><font color=3D"#666699"><em><span>02/25/2026 11:00 AM EST</span></em></f= ont></p>
<p><em>The purpose of this Alert is to provide resources for organizations = with Cisco Software-Defined Wide-Area Networking (SD-WAN) systems, includin=
g Federal Civilian Executive Branch (FCEB) agencies, to address ongoing exp= loitation of multiple vulnerabilities. Notably, the Cybersecurity and Infra= structure Security Agency (CISA) has added=C2=A0</em><a href=3D"
https://www= .cve.org/CVERecord?id=3DCVE-2026-20127" target=3D"_blank" title=3D"CVE-2026= -20127" class=3D"ext" data-extlink=3D"" rel=3D"noopener">CVE-2026-20127</a>= <em><span>=C2=A0</span>and=C2=A0</em><a href=3D"
https://www.cve.org/CVEReco= rd?id=3DCVE-2022-20775" target=3D"_blank" title=3D"CVE-2022-20775" class=3D= "ext" data-extlink=3D"" rel=3D"noopener">CVE-2022-20775</a><em><span>=C2=A0= </span>to its Known Exploited Vulnerabilities (KEV) Catalog on Feb. 25, 202=
6. As a result of the malicious cyber activity and vulnerabilities involvin=
g Cisco SD-WAN systems, CISA has outlined requirements for FCEB agencies in=
Emergency Directive (ED) 26-03 to inventory Cisco SD-WAN systems, update t= hem, and assess compromise.</em></p>
<p>CISA and partners have observed malicious cyber actors targeting and com= promising Cisco SD-WAN systems of organizations, globally. These actors hav=
e been observed exploiting a previously undisclosed authentication bypass v= ulnerability, CVE-2026-20127, for initial access before escalating privileg=
es using CVE-2022-20775 and establishing long-term persistence in Cisco SD-= WAN systems.</p>
<p>CISA, National Security Agency (NSA), and international partners Austral= ian Signals Directorate=E2=80=99s Australian Cyber Security Centre (ASD=E2= =80=99s ACSC), Canadian Centre for Cyber Security (Cyber Centre), New Zeala=
nd National Cyber Security Centre (NCSC-NZ), and United Kingdom National Cy= ber Security Centre (NCSC-UK), hereafter the =E2=80=9Cauthoring organizatio= ns,=E2=80=9D strongly urge network defenders to immediately 1) inventory al=
l in-scope Cisco SD-WAN systems, 2) collect artifacts, including virtual sn= apshots and logs off of SD-WAN systems to support threat hunt activities, 3=
) fully patch Cisco SD-WAN systems with available updates, 4) hunt for evid= ence of compromise, and 5) concurrently review Cisco=E2=80=99s latest secur= ity advisories,<span>=C2=A0</span><a href=3D"
https://sec.cloudapps.cisco.co= m/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk"=
target=3D"_blank" title=3D"Cisco Catalyst SD-WAN Controller Authentication=
Bypass Vulnerability" class=3D"ext" data-extlink=3D"" rel=3D"noopener">Cis=
co Catalyst SD-WAN Controller Authentication Bypass Vulnerability</a><span>= =C2=A0</span>and<span>=C2=A0</span><a href=3D"
https://sec.cloudapps.cisco.c= om/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX= 8D4v" target=3D"_blank" title=3D"Cisco Catalyst SD-WAN Vulnerabilities" cla= ss=3D"ext" data-extlink=3D"" rel=3D"noopener">Cisco Catalyst SD-WAN Vulnera= bilities</a>, and implement<span>=C2=A0</span><a href=3D"
https://sec.clouda= pps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuid=
e" target=3D"_blank" title=3D"Cisco=E2=80=99s SD-WAN Hardening Guidance" cl= ass=3D"ext" data-extlink=3D"" rel=3D"noopener">Cisco=E2=80=99s SD-WAN Harde= ning Guidance</a>.<a href=3D"
https://www.cisa.gov/news-events/alerts/2026/0= 2/25/cisa-and-partners-release-guidance-ongoing-global-exploitation-cisco-s= d-wan-systems#note1"><sup>1</sup></a></p>
<p>To address malicious activity involving vulnerable Cisco SD-WAN systems,=
CISA issued<span>=C2=A0</span><a href=3D"
https://www.cisa.gov/news-events/= directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems" target= =3D"_blank" title=3D"Emergency Directive 26-03: Mitigate Vulnerabilities in=
Cisco SD-WAN Systems" rel=3D"noopener">Emergency Directive 26-03: Mitigate=
Vulnerabilities in Cisco SD-WAN Systems</a>, which outlines requirements f=
or FCEB agencies to inventory Cisco SD-WAN systems, update them, and assess=
compromise. Further, CISA released<span>=C2=A0</span><a href=3D"
https://ww= w.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-= hardening-guidance-cisco-sd-wan-systems" target=3D"_blank" title=3D"Supplem= ental Emergency Directive 26-03: Hunt and Hardening Guidance for Cisco SD-W=
AN Systems" rel=3D"noopener">Supplemental Emergency Direction 26-03: Hunt a=
nd Hardening Guidance for Cisco SD-WAN Systems</a><span>=C2=A0</span>to pro= vide prescriptive actions for FCEB agencies.=C2=A0</p>
<p>Cisco=E2=80=99s Catalyst SD-WAN Hardening Guide recommends that network = defenders address:</p>
<strong>Network perimeter controls</strong>: Ensure control components are = behind a firewall, isolate virtual private network (VPN) 512 interfaces, an=
d use internet protocol (IP) blocks for manually provisioned edge IPs.</li>
<strong>SD-WAN manager access</strong>: Replace the self-signed certificate=
for the web user interface.</li>
<strong>Control and data plane security</strong>: Use pairwise keys.</li>
<strong>Session timeout</strong>: Limit to the shortest period possible.</l=
<strong>Logging</strong>: Forward to a remote syslog server.</li>
</ul>
<p>CISA and the authoring organizations are providing the following resourc= es:=E2=80=AF=C2=A0</p>
<li>CISA:<span>=C2=A0</span><a href=3D"
https://www.cisa.gov/news-events/dir= ectives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems" target=3D"_= blank" title=3D"Emergency Directive 26-03: Mitigate Vulnerabilities in Cisc=
o SD-WAN Systems" rel=3D"noopener">Emergency Directive 26-03: Mitigate Vuln= erabilities in Cisco SD-WAN Systems</a>
</li>
<li>CISA:<span>=C2=A0</span><a href=3D"
https://www.cisa.gov/news-events/dir= ectives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-s= d-wan-systems" target=3D"_blank" title=3D"Supplemental Emergency Directive = 26-03: Hunt and Hardening Guidance for Cisco SD-WAN Systems" rel=3D"noopene= r">Supplemental Emergency Direction 26-03: Hunt and Hardening Guidance for = Cisco SD-WAN Systems</a>
</li>
<li>Cisco:<span>=C2=A0</span><a href=3D"
https://sec.cloudapps.cisco.com/sec= urity/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk" targ= et=3D"_blank" title=3D"Cisco Catalyst SD-WAN Controller Authentication Bypa=
ss Vulnerability" class=3D"ext" data-extlink=3D"" rel=3D"noopener">Cisco Ca= talyst SD-WAN Controller Authentication Bypass Vulnerability</a>
</li>
<li>Cisco:<span>=C2=A0</span><a href=3D"
https://sec.cloudapps.cisco.com/sec= urity/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v" = target=3D"_blank" title=3D"Cisco Catalyst SD-WAN Vulnerabilities" class=3D"= ext" data-extlink=3D"" rel=3D"noopener">Cisco Catalyst SD-WAN Vulnerabiliti= es</a>
</li>
<li>Cisco:<span>=C2=A0</span><a href=3D"
https://sec.cloudapps.cisco.com/sec= urity/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide" target=3D"_bla= nk" title=3D"Cisco Catalyst SD-WAN Hardening Guide" class=3D"ext" data-extl= ink=3D"" rel=3D"noopener">Cisco Catalyst SD-WAN Hardening Guide</a>
</li>
<li>ASD=E2=80=99s ACSC:<span>=C2=A0</span><a href=3D"
https://www.cyber.gov.= au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf=
" target=3D"_blank" title=3D"Cisco SD-WAN Threat Hunt Guide" class=3D"ext" = data-extlink=3D"" rel=3D"noopener">Cisco SD-WAN Threat Hunt Guide</a>, co-s= ealed by CISA, NSA, Cyber Centre, NCSC-NZ, and NCSC-UK. This guide, based o=
n investigative data, supports network defenders=E2=80=99 detection of and = response to the malicious actors=E2=80=99 threat activity</li>
</ul>
<h2><strong>Acknowledgements</strong></h2>
<p>NSA, ASD=E2=80=99s ACSC, Cyber Centre, NCSC-NZ, and NCSC-UK contributed =
to this alert<strong>.</strong></p>
<h2><strong>Disclaimer</strong></h2>
<p>The information in this report is being provided =E2=80=9Cas is=E2=80=9D=
for informational purposes only. CISA does not endorse any commercial enti= ty, product, company, or service, including any entities, products, or serv= ices linked within this document. Any reference to specific commercial enti= ties, products, processes, or services by service mark, trademark, manufact= urer, or otherwise, does not constitute or imply endorsement, recommendatio=
n, or favoring by CISA.=E2=80=AF</p>
<strong>Notes</strong>=C2=A0</h2>
<p><a id=3D"Note1" name=3D"Note1"></a>1<span>=C2=A0</span>Cisco Security, = =E2=80=9CCisco Catalyst SD-WAN Hardening Guide,=E2=80=9D last modified Febr= uary 9, 2026,<span>=C2=A0</span><a href=3D"
https://sec.cloudapps.cisco.com/= security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide" target=3D"_= blank" title=3D"(opens in a new window)" class=3D"ext" data-extlink=3D"" re= l=3D"noopener">
https://sec.cloudapps.cisco.com/security/center/resources/Ci= sco-Catalyst-SD-WAN-HardeningGuide</a></p>
</div>
</div>
</div>
<div class=3D"l-constrain l-page-section--rich-text">
<div class=3D"l-page-section__content">
<div class=3D"c-field c-field--name-body c-field--type-text-with-summary c-= field--label-hidden">
<div class=3D"c-field__content">
<p>This product is provided subject to this=C2=A0<a href=3D"
https://edit.ci= sa.gov/notification" target=3D"_blank" title=3D"Follow link" rel=3D"noopene= r">Notification</a>=C2=A0and this=C2=A0<a href=3D"
https://edit.cisa.gov/pri= vacy-policy" target=3D"_blank" title=3D"Follow link" rel=3D"noopener">Priva=
cy & Use</a>=C2=A0policy.</p>
</div>
</div>
</div>
</div>
<p>Please share your thoughts with us through this this <a href=3D"
https://= cisasurvey.gov1.qualtrics.com/jfe/form/SV_9n4TtB8uttUPaM6?Source=3DGovDeliv= eryED26-03-Alert-Guidance">anonymous survey</a>. We appreciate your feedbac= k.</p>
=20
<div id=3D"mail_footer">
<p style=3D"text-align: center;"><span style=3D"font-size: 10.0pt; colo=
r: #757575;">Having trouble viewing this message?=C2=A0</span><a href=3D"ht= tps://links-2.govdelivery.com/CL0/%2520/1/0101019c95b53222-63f9c43f-9e9a-40= cc-811e-13ab4a106673-000000/5F7NKAmYwMuIJwD00c5GEsOXa_gQGQBh-v6_o_NedXc=3D4= 46" target=3D"_blank" rel=3D"noopener">View it as a webpage</a>.=C2=A0<a hr= ef=3D"
https://content.govdelivery.com/accounts/USDHS/bulletins/292141e" tar= get=3D"_blank" rel=3D"noopener"></a><span style=3D"font-size: 10.0pt; color=
: #757575;"></span></p>
<p style=3D"text-align: center;"><span style=3D"font-size: 10.0pt; color: #= 757575;">You are subscribed to updates from the </span><a href=3D"
https://w= ww.cisa.gov"><span style=3D"font-size: 10.0pt;">Cybersecurity and Infrastru= cture Security Agency</span></a><span style=3D"font-size: 10.0pt; color: #7= 57575;"> (CISA)<br></span><a href=3D"
https://public.govdelivery.com/account= s/USDHSCISA/subscriber/edit?preferences=3Dtrue#tab1" target=3D"_blank" rel= =3D"noopener"><span style=3D"font-size: 10.0pt; color: #00568c;">Manage Sub= scriptions</span></a>=C2=A0=C2=A0<span style=3D"font-size: 10.0pt; color: #= 757575;">|=C2=A0=C2=A0</span><a href=3D"
https://www.cisa.gov/privacy-policy=
" target=3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; colo=
r: #00568c;">Privacy Policy</span></a><span style=3D"font-size: 10.0pt; col= or: #757575;">=C2=A0=C2=A0|=C2=A0 <a href=3D"
https://subscriberhelp.granicu= s.com/s/article/Subscriber-Help-Center" target=3D"_blank" rel=3D"noopener">= Help</a><a href=3D"
https://insights.govdelivery.com/Communications/Subscrib= er_Help_Center" target=3D"_blank" rel=3D"noopener"></a></span><span style= =3D"font-size: 10.0pt; color: #757575;"></span></p>
<p style=3D"text-align: center;"><span style=3D"font-size: 10.0pt; color: #= 757575;">Connect with CISA: <br></span><a href=3D"
https://www.facebook.com/= CISA" target=3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; = color: #00568c;">Facebook</span></a><span style=3D"font-size: 10.0pt; color=
: #757575;">=C2=A0 |=C2=A0 </span><a href=3D"
https://twitter.com/CISAgov" t= arget=3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; color: = #00568c;">Twitter</span></a><span style=3D"font-size: 10.0pt; color: #75757= 5;">=C2=A0 |=C2=A0 </span><a href=3D"
https://Instagram.com/cisagov" target= =3D"_blank" rel=3D"noopener"><span style=3D"font-size: 10.0pt; color: #0056= 8c;">Instagram</span></a><span style=3D"font-size: 10.0pt; color: #757575;"= >=C2=A0 |=C2=A0 </span><a href=3D"
https://www.linkedin.com/company/cybersec= urity-and-infrastructure-security-agency" target=3D"_blank" rel=3D"noopener= "><span style=3D"font-size: 10.0pt; color: #00568c;">LinkedIn</span></a><sp=
an style=3D"font-size: 10.0pt; color: #757575;">=C2=A0 |=C2=A0=C2=A0 </span= ><a href=3D"
https://www.youtube.com/channel/UCxyq9roe-npgzrVwbpoAy0A" targe= t=3D"_self"><span style=3D"font-size: 10.0pt; color: #00568c;">YouTube</spa= n></a><span style=3D"font-size: 10.0pt; color: #757575;"></span></p>
</div>
<div id=3D"tagline">
<hr>
<table style=3D"width: 100%;" border=3D"0" cellspacing=3D"0" cellpadding=3D=
<tbody>
<td style=3D"color: #757575; font-size: 10px; font-family: Arial;" width=3D= "89%">This email was sent to
cisa@toolazy.synchro.net using GovDelivery Com= munications Cloud, on behalf of: Cybersecurity and Infrastructure Security = Agency =C2=B7 707 17th St, Suite 4000 =C2=B7 Denver, CO 80202</td>
<td align=3D"right" width=3D"11%"><a href=3D"
https://subscriberhelp.granicu= s.com/" target=3D"_blank" rel=3D"noopener"><img src=3D"
https://content.govd= elivery.com/images/govd-logo-dark.png" border=3D"0" alt=3D"GovDelivery logo=
" width=3D"115"></a></td>
</tr>
</tbody>
</table>
<style type=3D"text/css">body .abe-column-block { min-height: 5px; } table.= gd_combo_table img {margin-left:10px; margin-right:10px;} table.gd_combo_ta= ble div.govd_image_display img, table.gd_combo_table td.gd_combo_image_cell=
img {margin-left:0px; margin-right:0px;}</style>
</div>
</td>
</tr>
</table>
<img alt=3D"" src=3D"
https://links-2.govdelivery.com/CI0/0101019c95b53222-6= 3f9c43f-9e9a-40cc-811e-13ab4a106673-000000/L-jAql9LNlzMHN5ENIzZuBTVD3lubenK= whr5_JQGQi4=3D446" style=3D"display: none; width: 1px; height: 1px;">
</body>
</html>
--===============1731792185678271427==--
--===============8856491512790867670==--