US Government Warns About Six Actively Exploited Vulnerabilities
CISA has added multiple critical security flaws to its Known Exploited Vulnerabilities catalog, including threats targeting corporate communication systems.
The Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent advisory on May 19, 2025, warning organizations about six newly discovered vulnerabilities that are actively being exploited by threat actors. These vulnerabilities have been added to the agency Known Exploited Vulnerabilities (KEV) catalog, prompting immediate action from federal agencies and serving as a warning to private sector organizations.
Two particularly concerning vulnerabilities affect Ivanti’s Endpoint Manager Mobile (EPMM) platform. These flaws, tracked as CVE-2025-4427 and CVE-2025-4428, were disclosed in a security advisory published by Ivanti on May 13. When combined, these vulnerabilities allow attackers to bypass authentication controls and execute malicious code remotely on affected systems.
In a troubling development, Output Messenger, a corporate chat tool developed by Indian company Srimax Software, contains a directory traversal vulnerability (CVE-2025-27920). Microsoft researchers revealed this flaw was being exploited as a zero-day vulnerability in intelligence operations across the Middle East region.
The Zimbra Collaboration Suite (ZCS) developed by Synacor is affected by a cross-site scripting (XSS) vulnerability tracked as CVE-2024-27443. This security flaw exists in the calendar invitation feature and allows attackers to execute arbitrary JavaScript code when specially crafted emails are opened in the webmail interface.
Similarly, MDaemon Technologies’ Email Server contains a cross-site scripting vulnerability (CVE-2024-11182) affecting its webmail component, potentially allowing attackers to compromise email communications.
The advisory also highlighted a path traversal vulnerability (CVE-2023-38950) affecting BioTime, a time and attendance management system from ZKTeco that integrates with biometric authentication devices. This vulnerability has been observed in active attack campaigns.
Organizations using any of these affected systems should:
Federal agencies must remediate these vulnerabilities within CISA’s specified timeframe. However, given the active exploitation status, all organizations are strongly encouraged to address these vulnerabilities as quickly as possible to prevent potential breaches.