BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /CISA Adds GitLab SSRF and Dell RP4VMs Hard-coded Credentials Vulnerabilities to KEV Catalog

CISA Adds GitLab SSRF and Dell RP4VMs Hard-coded Credentials Vulnerabilities to KEV Catalog

February 18, 2026Vulnerabilities & Exploits2 min readcritical

Originally reported by CISA Alerts

#cisa-kev#gitlab#dell#ssrf#active-exploitation#federal-directive
Share

TL;DR

CISA adds GitLab SSRF and Dell RecoverPoint hard-coded credential vulnerabilities to KEV catalog, requiring federal agencies to remediate due to active exploitation evidence.

Why critical?

CISA's addition to the KEV catalog confirms active exploitation of these vulnerabilities in the wild. KEV additions represent immediate, confirmed threats to federal and enterprise networks.

Active Exploitation Confirmed

The Cybersecurity and Infrastructure Security Agency has expanded its Known Exploited Vulnerabilities catalog with two CVEs showing evidence of active exploitation in the wild. The additions target enterprise infrastructure components commonly deployed across federal and private sector networks.

The newly cataloged vulnerabilities include:

  • CVE-2021-22175: GitLab Server-Side Request Forgery vulnerability
  • CVE-2026-22769: Dell RecoverPoint for Virtual Machines hard-coded credentials vulnerability

Federal Remediation Requirements

Under Binding Operational Directive 22-01, Federal Civilian Executive Branch agencies must remediate these vulnerabilities by CISA-specified deadlines. The directive establishes the KEV catalog as the authoritative list of CVEs posing significant risk to federal enterprise networks.

While BOD 22-01 applies specifically to federal agencies, CISA recommends all organizations prioritize KEV catalog vulnerabilities in their patch management cycles. The agency's KEV additions represent confirmed threat actor activity rather than theoretical risk assessments.

Attack Vector Analysis

The GitLab SSRF vulnerability enables attackers to force the application to make requests to arbitrary destinations, potentially exposing internal services or facilitating lateral movement. Server-side request forgeries remain attractive to threat actors for their ability to bypass network perimeter controls.

Dell's RecoverPoint hard-coded credential issue represents a fundamental authentication bypass, allowing unauthorized access to backup and disaster recovery systems. Such vulnerabilities in backup infrastructure pose particular risks given their privileged access to critical data.

Sources

  • CISA Adds Two Known Exploited Vulnerabilities to Catalog

Originally reported by CISA Alerts

Tags

#cisa-kev#gitlab#dell#ssrf#active-exploitation#federal-directive

Related Intelligence

  • CISA Adds FileZen to KEV as Multiple Critical Vulnerabilities Surface

    criticalFeb 25, 2026
  • Critical Zero-Day Roundup: Dell RecoverPoint Exploited Since 2024, VoIP Phones Under Attack

    criticalFeb 18, 2026
  • Critical n8n RCE Hits KEV Catalog While Attackers Weaponize SOC Fatigue and Target Developers

    criticalMar 12, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Citizen Lab Exposes Cellebrite Tool Abuse Against Kenyan Activist

Next Article

AI Assistants Exploited for Covert Command-and-Control Communications →