CISA Adds Two Exploited Vulnerabilities to KEV Catalog
Summary
CISA has added two new vulnerabilities, CVE-2026-3909 and CVE-2026-3910, to its Known Exploited Vulnerabilities (KEV) Catalog due to evidence of active exploitation. Federal Civilian Executive Branch (FCEB) agencies are required to remediate these vulnerabilities per Binding Operational Directive (BOD) 22-01.
What changed
The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog by adding two new vulnerabilities: CVE-2026-3909 (Google Skia Out-of-Bounds Write Vulnerability) and CVE-2026-3910 (Google Chromium V8 Unspecified Vulnerability). These additions are based on evidence of active exploitation and are considered significant risks to the federal enterprise.
Federal Civilian Executive Branch (FCEB) agencies are mandated by Binding Operational Directive (BOD) 22-01 to remediate these identified vulnerabilities by the established due date to protect their networks. While BOD 22-01 specifically applies to FCEB agencies, CISA strongly recommends that all organizations prioritize the remediation of vulnerabilities listed in the KEV Catalog as part of their ongoing vulnerability management practices to mitigate cyberattack risks.
What to do next
- FCEB agencies must remediate CVE-2026-3909 and CVE-2026-3910 by the due date specified in BOD 22-01.
- All organizations are strongly urged to prioritize remediation of these vulnerabilities as part of their vulnerability management program.
Source document (simplified)
Alert
CISA Adds Two Known Exploited Vulnerabilities to Catalog
Release Date
March 13, 2026
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-3909 Google Skia Out-of-Bounds Write Vulnerability
- CVE-2026-3910 Google Chromium V8 Unspecified Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
This product is provided subject to this Notification and this Privacy & Use policy.
Please share your thoughts
We recently updated our anonymous product survey; we welcome your feedback.
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Government alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CISA ICS-CERT Advisories publishes new changes.