BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

CISA adds ConnectWise, Microsoft flaws to exploit

US adds exploited ConnectWise and Windows flaws to urgent threat catalog.

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two actively exploited software flaws to its high-threat catalog on April 29, 2026.
  • The new entries include CVE-2024-1708, a path traversal bug in ConnectWise ScreenConnect, and CVE-2026-32202, a protection failure in Microsoft Windows Shell.
  • The Windows flaw, which originated from an incomplete patch for a prior zero-day, has been exploited by the Russian hacking group APT28 since late 2025.

On April 29, 2026, the U.S. Cybersecurity and Infrastructure Security Agency urgently updated its catalog of actively exploited threats, adding two critical vulnerabilities in widely used enterprise software. This action was based on confirmed evidence of active exploitation by malicious actors.

- Advertisement -

The first vulnerability, CVE-2024-1708, is a path traversal flaw in ConnectWise ScreenConnect that could permit remote code execution. The second, CVE-2026-32202, is a protection mechanism failure in Microsoft Windows Shell allowing network spoofing.

Microsoft updated its advisory to acknowledge active exploitation of the Windows flaw just a day before the CISA listing. However, the company has not publicly detailed the specific attacks leveraging the Shell vulnerability.

According to Akamai, CVE-2026-32202 stemmed from an incomplete patch for another vulnerability, CVE-2026-21510. Consequently, this flaw was exploited as a zero-day by the Russian group APT28 alongside CVE-2026-21513 in attacks since December 2025.

Meanwhile, exploitation of the ConnectWise ScreenConnect bug, CVE-2024-1708, has been chained with a critical authentication bypass (CVE-2024-1709) for years. Earlier in April 2026, Microsoft linked these flaws to the China-based threat actor Storm-1175 in ransomware attacks.

- Advertisement -

Federal Civilian Executive Branch agencies are now required to apply necessary patches by May 12, 2026. This mandate aims to secure networks against these documented and ongoing threats.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

GitHub Probes Internal Repo Theft

GitHub is investigating unauthorized access to its internal repositories after a threat actor listed...

SOL’s Negative Funding Rate Hints at Bearish Pressure

Solana's SOL token corrected 15% after facing rejection at $98, with derivatives data showing...

Prometheum Executes First Crypto Trades After 10-Year Wait

Prometheum has executed its first crypto trades nearly a decade after its founding and...

Musk: AI data centers in space “much easier than people think”

SpaceX's Elon Musk outlined a vision for orbital AI data centers powered by Starship,...

Theta EdgeCloud Boosts LLM Speed by Splitting GPU Work

Benchmark testing shows splitting AI workloads between separate GPUs speeds up large language model...

Must Read

Top 8 Books Every Beginner Should Read About Cryptocurrency

Cryptocurrency and blockchain technology are filled with technical terms that beginners find challenging to understand. One of the best ways to learn about cryptocurrency...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading