Last Update: 04/05/2026 at 2:50 PM EST
CISA Pushes Federal Patching Drive
Coverage from BleepingComputer and others
Articles
7
Latest Article
03/31
Active Days
37
Executive Summary
CISA ordered federal agencies to patch actively exploited flaws in iPhone, Roundcube, FTP, and Cisco products as attacks spread.
- CISA added three DarkSword-linked iOS CVEs to the actively exploited catalog and set an April 3 deadline for federal fixes
- DarkSword used six iPhone flaws to enable sandbox escape, privilege escalation, and remote code execution on unpatched devices
- GTIG and iVerify linked DarkSword to data theft malware and watering-hole attacks on compromised Ukrainian websites
- CISA flagged Roundcube CVE-2025-49113 and CVE-2025-68461 as actively exploited and ordered federal patching by March 13
- Wing FTP Server CVE-2025-47813 was added to the exploited catalog after reports of active abuse and password theft risk
- Cisco FMC CVE-2026-20131 was ordered patched by March 22 after Amazon tied it to Interlock ransomware zero-day use
- CISA warned that the flaws were frequent attack vectors and urged private sector defenders to patch affected systems quickly
Quick Facts
- What: Ordered urgent patching of actively exploited software flaws
- Where: U.S. federal systems and exposed internet-facing services
- Why: To block remote code execution, data theft, and ransomware
- Who: CISA, federal agencies, vendors, and threat actors
- When: March and April 2026 deadlines after active exploitation

