The Containment Era is here. →Explore

Executive Summary

On April 28, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog: CVE-2024-1708, a path traversal vulnerability in ConnectWise ScreenConnect versions 23.9.7 and prior, and CVE-2026-32202, a Windows Shell protection mechanism failure. CVE-2024-1708 allows attackers to execute remote code or access sensitive data by exploiting improper path handling, while CVE-2026-32202 enables attackers to steal NTLMv2 hashes without user interaction, leading to potential unauthorized access. (sentinelone.com)

The inclusion of these vulnerabilities in the KEV Catalog underscores the ongoing threat posed by actively exploited security flaws. Organizations are urged to prioritize patching these vulnerabilities to mitigate risks associated with remote code execution and unauthorized data access, which can lead to significant operational disruptions and data breaches.

Why This Matters Now

The addition of CVE-2024-1708 and CVE-2026-32202 to CISA's KEV Catalog highlights the immediate need for organizations to address these actively exploited vulnerabilities. Failure to remediate these issues promptly could result in severe security incidents, including data breaches and system compromises.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

CVE-2024-1708 is a path traversal vulnerability in ConnectWise ScreenConnect versions 23.9.7 and prior, allowing attackers to execute remote code or access sensitive data by exploiting improper path handling.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix Zero Trust Cloud Native Security Fabric (CNSF) is pertinent to this incident as it could have constrained the attacker's ability to exploit vulnerabilities, escalate privileges, move laterally, establish command and control channels, exfiltrate data, and cause operational disruption.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: The attacker's ability to exploit these vulnerabilities would likely be constrained, reducing the scope of initial access.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: The attacker's ability to escalate privileges would likely be constrained, reducing the scope of elevated access.

Lateral Movement

Control: East-West Traffic Security

Mitigation: The attacker's ability to move laterally would likely be constrained, reducing the scope of network traversal.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: The attacker's ability to establish command and control channels would likely be constrained, reducing the scope of persistent access.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: The attacker's ability to exfiltrate data would likely be constrained, reducing the scope of data loss.

Impact (Mitigations)

The attacker's ability to cause operational disruption and data loss would likely be constrained, reducing the scope of impact.

Impact at a Glance

Affected Business Functions

  • Remote Access Services
  • Network Security
  • System Administration
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $50,000

Data Exposure

Potential exposure of sensitive system configurations and user credentials.

Recommended Actions

  • Implement Inline IPS (Suricata) to detect and prevent exploitation of known vulnerabilities.
  • Deploy Zero Trust Segmentation to limit lateral movement within the network.
  • Utilize East-West Traffic Security to monitor and control internal traffic flows.
  • Establish Multicloud Visibility & Control to detect and respond to command and control activities.
  • Enforce Egress Security & Policy Enforcement to prevent unauthorized data exfiltration.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image