2026 Futuriom 50: Highlights →Explore

Executive Summary

In February 2026, the Cybersecurity and Infrastructure Security Agency (CISA) added four vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, indicating active exploitation. These vulnerabilities include CVE-2019-19006 and CVE-2025-64328 in Sangoma FreePBX, CVE-2021-39935 in GitLab Community and Enterprise Editions, and CVE-2025-40551 in SolarWinds Web Help Desk. The vulnerabilities range from improper authentication and OS command injection to server-side request forgery and deserialization of untrusted data, posing significant risks to affected systems.

The inclusion of these vulnerabilities in the KEV Catalog underscores the persistent threat posed by unpatched software. Organizations are urged to prioritize remediation efforts to mitigate potential exploitation, as these vulnerabilities are actively targeted by malicious actors.

Why This Matters Now

The addition of these vulnerabilities to the KEV Catalog highlights the ongoing risk of unpatched systems being exploited. Immediate remediation is crucial to prevent potential breaches and maintain system integrity.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The vulnerabilities include CVE-2019-19006 and CVE-2025-64328 in Sangoma FreePBX, CVE-2021-39935 in GitLab, and CVE-2025-40551 in SolarWinds Web Help Desk.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attackers' ability to exploit vulnerabilities, escalate privileges, move laterally, establish command and control channels, exfiltrate data, and disrupt services by enforcing strict segmentation and identity-aware policies.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: The CNSF would likely have constrained unauthorized access by enforcing strict identity-based policies, reducing the attack surface available to exploit vulnerabilities.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Zero Trust Segmentation would likely have restricted privilege escalation by enforcing least-privilege access controls, limiting the scope of actions an attacker could perform.

Lateral Movement

Control: East-West Traffic Security

Mitigation: East-West Traffic Security would likely have limited lateral movement by monitoring and controlling internal traffic, reducing the ability of attackers to access additional systems.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: Multicloud Visibility & Control would likely have detected and constrained command and control channels by providing comprehensive monitoring across cloud environments.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Egress Security & Policy Enforcement would likely have restricted data exfiltration by controlling outbound traffic and enforcing strict egress policies.

Impact (Mitigations)

The deployment of web shells and subsequent service disruptions would likely have been constrained by the cumulative enforcement of CNSF controls, reducing the overall impact of the attack.

Impact at a Glance

Affected Business Functions

  • Telephony Services
  • VoIP Communications
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $50,000

Data Exposure

Potential exposure of call logs and voice recordings.

Recommended Actions

  • Implement Zero Trust Segmentation to enforce least privilege access and limit lateral movement within the network.
  • Deploy Inline IPS (Suricata) to detect and prevent exploitation attempts targeting known vulnerabilities.
  • Utilize Multicloud Visibility & Control to monitor and manage traffic across cloud environments, identifying anomalous interactions.
  • Enforce Egress Security & Policy Enforcement to control outbound traffic and prevent unauthorized data exfiltration.
  • Apply Threat Detection & Anomaly Response mechanisms to identify and respond to suspicious activities promptly.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image