CISA flags five newly exploited flaws affecting Apple, Craft CMS, and Laravel Livewire

March 20, 20262 min read2 sources
Share:
CISA flags five newly exploited flaws affecting Apple, Craft CMS, and Laravel Livewire

CISA has added five vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog after finding evidence of active exploitation, putting defenders on notice that the bugs are already being used in real attacks. The newly listed issues are CVE-2025-31277, a buffer overflow affecting multiple Apple products; CVE-2025-32432, a code injection flaw in Craft CMS; CVE-2025-43510, an improper locking issue affecting multiple Apple products; CVE-2025-43520, a classic buffer overflow in multiple Apple products; and CVE-2025-54068, a code injection flaw in Laravel Livewire.

CISA’s KEV Catalog is a priority remediation list used across government and widely followed by private-sector security teams. Inclusion means the agency has determined the vulnerabilities are not just severe on paper but are being exploited in the wild. Under Binding Operational Directive 22-01, federal civilian agencies must remediate KEV-listed flaws by CISA’s deadlines.

The mix of affected products broadens the risk. Three Apple entries suggest active exploitation against consumer and enterprise endpoints, though CISA’s alert does not include technical details on the affected components or attack chains. The two web application flaws may be especially urgent for internet-facing systems: code injection bugs in Craft CMS and Laravel Livewire can lead to server compromise, data theft, web shell deployment, or follow-on access into connected environments if left unpatched.

For defenders, the immediate priority is straightforward: identify exposed Apple devices and any deployments running Craft CMS or Laravel Livewire, apply vendor fixes, and review logs for signs of exploitation. Organizations that cannot patch immediately should restrict exposure where possible and monitor for suspicious administrative activity, unexpected file changes, and outbound connections from affected systems. Remote staff accessing sensitive systems should also use secure channels such as a VPN while incident response and patching are underway.

One caveat: the CISA alert confirms active exploitation and KEV inclusion, but fuller technical specifics, affected versions, and patch guidance should be verified through vendor advisories and the KEV entry itself. Even so, KEV status alone is enough to move these flaws to the top of patch queues.

Share:

// SOURCES

// RELATED

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17

ZionSiphon malware designed to sabotage water treatment systems

A new proof-of-concept malware, ZionSiphon, demonstrates how attackers can sabotage water treatment plants by manipulating industrial control systems.

2 min readApr 17

ThreatsDay bulletin: A deep dive into the Defender 0-day, SonicWall attacks, and a 17-year-old Excel flaw

This week’s threat bulletin is a heavy one. We analyze the critical Microsoft Defender 0-day, a massive SonicWall brute-force campaign, and a 17-year-

6 min readApr 17

Microsoft Defender's 'RedSun' zero-day: A researcher's protest and a threat to Windows systems

A researcher's protest exposed a critical zero-day in Microsoft Defender, allowing attackers full system control. Here's the technical breakdown and h

7 min readApr 17