CISA Warns of Microsoft Exchange and Windows CLFS Vulnerabilities Exploited in Attacks

CISA Warns of Microsoft Exchange and Windows CLFS Vulnerabilities Exploited in Attacks
CISA Warns of Microsoft Exchange and Windows CLFS Vulnerabilities Exploited in Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning to organizations regarding two severe Microsoft vulnerabilities.

On April 13, 2026, the agency officially added flaws affecting Microsoft Exchange Server and the Windows Common Log File System (CLFS) Driver to its Known Exploited Vulnerabilities (KEV) catalog.

According to CISA’s latest threat intelligence update, threat actors are actively exploiting both vulnerabilities in the wild.

While it remains unknown whether these specific flaws are being exploited in active ransomware campaigns, the agency mandates that federal entities apply available patches by April 27, 2026, and strongly urges private organizations to do the same.

Exchange Server Remote Code Execution

The first critical vulnerability, tracked as CVE-2023-21529, affects Microsoft Exchange Server. This security flaw stems from the deserialization of untrusted data (CWE-502).

Windows CLFS Privilege Escalation

The second vulnerability, identified as CVE-2023-36424, is an out-of-bounds read flaw in the Microsoft Windows CLFS driver.

  • Exploitation Mechanism: The CLFS driver fails to properly validate the boundaries of the memory it reads, which allows a local attacker to trigger the vulnerability.
  • Network Impact: Threat actors can exploit this weakness to escalate their system privileges and gain administrative control easily.
  • Threat Context: Privilege escalation bugs are critical links in modern attack chains.

Adversaries typically use them after gaining initial access, often through phishing, to gain total control of a machine, allowing them to turn off security software or deploy secondary payloads.

Mitigation Strategies and CISA Directives

CISA strictly requires Federal Civilian Executive Branch (FCEB) agencies to patch these vulnerabilities to comply with Binding Operational Directive (BOD) 22-01.

Furthermore, CISA strongly encourages private sector security teams to prioritize these fixes to protect their infrastructure.

Network defenders must take the following actions immediately:

System administrators should aggressively monitor their Microsoft Exchange and Windows environments for unusual activity, as these known exploited vulnerabilities represent a clear and present danger to enterprise security architectures.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post CISA Warns of Microsoft Exchange and Windows CLFS Vulnerabilities Exploited in Attacks appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading